Next Article in Journal
Design and Fabrication of Complex-Shaped Ceramic Bone Implants via 3D Printing Based on Laser Stereolithography
Previous Article in Journal
Use of a Mixed Cationic-Reverse Phase Column for Analyzing Small Highly Polar Metabolic Markers in Biological Fluids for Multiclass LC-HRMS Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Comparison of Massive MIMO System with Orthogonal and Nonorthogonal Multiple Access for Uplink in 5G Systems

by
Madalina-Georgiana Berceanu
,
Carmen Florea
and
Simona Halunga
*
Department of Telecommunications, University Politehnica of Bucharest, Splaiul Independenţei 313, RO-060042 Bucharest, Romania
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(20), 7139; https://doi.org/10.3390/app10207139
Submission received: 15 September 2020 / Revised: 7 October 2020 / Accepted: 10 October 2020 / Published: 14 October 2020
(This article belongs to the Section Computing and Artificial Intelligence)

Abstract

:
In the attempt to respond to market demands, new techniques for wireless communication systems have been proposed to ensure, to all active users that are sharing the same network cell, an increased quality of service, regardless of any environmental factors, such as their position within the cell, time, space, climate, and noise. One example is the nonorthogonal multiple access (NOMA) technique, proposed within the 5G standard, known for supporting a massive connectivity and a more efficient use of radio resources. This paper presents two new sets of complex codes— multiple-user shared-access (MUSA) and extended MUSA (EMUSA), and an algorithm of allocation such that the intercorrelation should be as reduced as possible that can be used in MUSA for 5G NOMA-based technique scheme. Also, it analyzes the possibility of creating complex codes starting from PN (cPN), which is a novel idea proposed in this paper, whose results are promising with respect to the overall system performances. First, a description of the basic principles of MUSA are presented; next, the description of the proposed system will be provided, whose performance will be tested using Monte Carlo MATLAB simulations based on bit error rate (BER) versus signal-to-noise ratio (SNR). The system performances are evaluated in different scenarios and compared with classical code division multiple access (CDMA) having the following system parameters in sight: the number of antennas at the receiver side and the number of active users.

1. Introduction

One of the highest challenges for future wireless communication systems is to ensure the support for massive data traffic, while maintaining a low communication latency [1,2,3,4,5], support needed due to the continuous evolution of multimedia applications and a rapidly growing number of users that request simultaneously access to different network resources from everywhere and anytime while maintaining a good quality of service (QoS) as well as a high flexibility with respect to individual user requirements. A promising technique envisioned to accomplish the above-mentioned demands and also provide a superior spectral efficiency is nonorthogonal multiple access (NOMA) that has been included in the new 5G standard [6,7,8,9,10,11].
An orthogonal multiple access (OMA) scheme assumes the use of a perfect receiver that makes a complete separation of the unwanted signals from the desired one, meaning that signals coming from different users are orthogonal to each other, either in time, frequency, or code domains [12,13,14]. Important to mention is that the orthogonality condition is effective when the system is underloaded, meaning that the number of active users is lower than the number of block resources (the number of degrees of freedom) [15,16]. A few examples of radio access technologies that fit within the OMA definition are time division multiple access (TDMA), frequency division multiple access (FDMA), code division multiple access (CDMA), and orthogonal frequency division multiple access (OFDMA).
OMA can accommodate only a single user within the same time/frequency resource block to cancel any user interferences (for example, TDMA, FDMA, and OFDMA; but CDMA allows multiple users to be served within the same resource block using a unique spreading sequence for each user in order to separate them) [17]. OMA also offers satisfactory performance regarding the inter-user interference (IUI), but it can be overlooked if IUI can be kept under normal standards using other domains [15,18]. By contrast, NOMA supports multiple users that can be served in the same time and frequency resource block, within the same cell, multiplexed in the power domain or code domain, typically used to suppress IUI [4,7].
The code domain NOMA schemes perform user multiplexing in code domain using a unique spreading sequence for each user with sparse, low-density, and low intercorrelation properties. As long as the orthogonality property is not available, these schemes offer grant-free access, but IUI is present; thus, at least from these aspects, these schemes can be perceived as an involution if compared with CDMA [15,16]. A couple of best-known code domain NOMA schemes are low-density signature (LDS) sequence-based CDMA [16] and interleave division multiple access (IDMA) [19]. Other closely related schemes are lattice partition multiple access (LPMA) [20], sparse code multiple access (SCMA) [21,22], multiuser shared access (MUSA) [23], resource spread multiple access (RSMA) [24], and pattern division multiple access (PDMA) [25,26]. In [27], the authors make a comparison between IDMA, RSMA, PDMA, and MUSA, taking into account the multiplexing domain, user overload, receiver type, receiver complexity, and grant-free transmission (each user can choose freely its spreading code), reaching the conclusion that MUSA offers a favorable balance between performance and complexity—high user overload and low implementation complexity, and it provides flexibility in grant-free transmissions.
Although orthogonal multiplexing offers a satisfactory performance regarding the throughput level in packet-domain services with a simple design of the receiver [28], future improvements are required and accomplished by nonorthogonal multiplexing, achieving a better efficiency of the system, achieving the capacity region of the downlink broadcast channel [29,30]. Note that NOMA can be applied also on the uplink channel [29,30,31] and together with OMA achieves the capacity region, but NOMA offers an enhancement regarding the trade-off between the capacity of the system and the user-fairness which is important in a cellular system when the channel conditions are different for different users because of the near–far effect [32].
In this paper, we are going to study the performance of an uplink system that employs a NOMA scheme, namely MUSA, in conjunction with massive multiple input multiple output (MIMO) techniques.
In an uplink MUSA system, the symbols of each user are being spread, using a complex spreading sequence, before transmitting by means of “shared access”, basically meaning a superposition process. Multiple spreading sequences form a pool from which a user can randomly choose one, but for the same user, different spreading sequences can be used, also randomly picked, for each transmitted symbol. The spreading sequences have short lengths which are more efficient in conjunction with successive interference cancellation (SIC) used at the receiver to separate superimposed symbols and low cross-correlation properties and they can be nonbinary [7,33,34,35].
Paper [36] presents the performance of MUSA by comparison with two other NOMA schemes, namely SCMA and PDMA, in terms of BER versus SNR. The data were quadrature phase-shift keying (QPSK)-modulated and transmitted over a channel affected by Rayleigh fading and SIC detector at the receiver. The authors concluded that SCMA obtained better performance due to the optimal design of codebooks while MUSA and PDMA had similar performance in the given simulation scenario. The authors in [37] evaluated the performance of MUSA spreading codes by comparison with pseudo-random noise (PN) with different user overloading but when turbo coding of rate ½ and QPSK modulation were used in an additive white Gaussian noise (AWGN) channel with MMSE-SIC detector at the receiver. The scenario with one antenna at the transmitter and one or two antennas at the receiver has been considered. The authors demonstrated that the block error rate (BLER) of MUSA compared to Long Term Evolution (LTE) standard does not have an important degradation even if the overload is high; also, grant-free MUSA can support higher traffic than grant-free OFDMA. Paper [38] presents a grant-free MUSA transmission that can achieve high overloading, with 4 to 20 users, where the data are turbo-coded at rate ½ and binary phase shift keying (BPSK)-modulation. The scenario with one antenna at the transmitter and two antennas at the receiver was analyzed, and the reception used a blind minimum mean square error - successive interference cancellation (MMSE-SIC) detector. Similarly, [39] proposes a high-overloaded autonomous grant-free MUSA transmission with 4 to 16 users, where the data is turbo-coded at rate ½ and BPSK-modulated and introduced in an OFDM block, then sent over a channel affected by flat fading. The system with one antenna at the transmitter and one antenna at the receiver was taken into consideration, and a blind multiuser detection (MUD) without reference signal was used at the receiver. Authors in [40] propose another high-overloaded autonomous grant-free MUSA transmission with 8 to 20 users, where the data is turbo-coded of rate ½ and BPSK-modulated and sent over a channel affected by flat fading. The scenario with one antenna at the transmitter and two antennas at the receiver was considered and a MUD detector with spatial combining was used at the receiver. In [41], the performance of a system which employs MUSA with two other NOMA techniques, namely SCMA and IDMA, was evaluated. A turbo channel coding was performed, then data from 12, 16, and 24 users were QPSK-modulated and entered in an OFDM block after which they were transmitted over a channel affected by Rayleigh fading. At the reception, a MMSE detector was used. The scenario with one antenna at the transmitter and one antenna at the receiver was considered. In [42] the authors present the bit error rate performance of an uplink MUSA transmission with binary, 3-ary, and 5-ary codes where data from six users were QPSK-modulated and then sent over a channel affected by Rayleigh fading. At the reception, an MMSE-ordered SIC detector was used. In [43], the authors compared, theoretically and numerically, the performance of a 12-user grant-free MUSA transmission with low detection complexity by employing SIC with OFDMA, SDMA-based OFDMA, LDS, and SCMA on the uplink. A low-density parity-check (LDPC) encoder block was used, followed by QPSK modulation and OFDM blocks, the information being transmitted over a channel with AWGN. It was observed that MUSA offers better results for high SNR values and high number of overlapping users. The authors present, in [44], a high-overloaded autonomous grant-free MUSA transmission with 8 to 20 users, where the data were LDPC-encoded and BPSK-modulated and sent over a channel affected by deep flat fading. The performance of such a system was studied in the presence of real Fourier-related transform spreading OFDM (RFRT-s-OFDM) by comparison with the traditional single carrier technology based on discrete Fourier transform spreading OFDM (DFT-s-OFDM). At the reception, a blind MMSE-SIC detector was used. The scenario with one antenna at the transmitter and two antennas at the receiver was considered. Time offset and frequency offset are also discussed here. In [45], the authors compare the performance of three different NOMA schemes—MUSA, PDMA, and SCMA, a QPSK-modulated transmission over Rayleigh fading channels in underloaded, fully loaded, and overloaded scenarios, employing two different receivers that have perfect knowledge of the channels—ordered successive interference cancellation (OSIC)-based MUD and message-passing algorithm (MPA)-based MUD. In [46], the authors present some interesting simulation results when NOMA is involved in uplink visible light communication system, while [47] proposes a multiuser hybrid equalizer system for broadband uplink massive MIMO millimeter-wave (mmWave) system.
Taking into account the information gathered from the papers mentioned above, our proposed system describes a communication process which involves one antenna at the transmitter and up to 30 antennas at the receiver. Besides the direct link (source–destination), a decode-and-forward (DF) relay is introduced as intermediary between source and destination in order to improve the coverage, ensuring a more reliable uplink connection in a network shared by up to 16 active users simultaneously. The multiple access technique used here is MUSA where the complex spreading codes were obtained following a code proposed by the authors taking into consideration all theoretical aspects included in the 3rd Generation Partnership Project (3GPPP) documents. Starting from the several sets of codes that are presented in [33,34,35], whose performances are analyzed in [43], we introduced two new sets of complex spreading codes, MUSA and EMUSA, and an algorithm of allocation such that the intercorrelation should be as reduced as possible. Moreover, we analyzed the possibility of creating complex codes starting from PN (cPN), which is a novel idea proposed in this paper, whose results are very promising. The purpose is to evaluate the performance in terms of BER versus SNR, using Monte Carlo MATLAB simulations. The rest of the paper is organized as follows: Section 2 presents the system model; the simulation results are included in Section 3; and finally, the conclusions are provided in Section 4.

2. System Model

We consider an uplink wireless communication using MUSA in a single-cell system with one base station (BS), one relay, and K users. For the MUSA scheme, the K users are multiplexed in code domain and are equipped with Nr antennas and the BS is equipped with Nt antennas, while the relay is equipped with Nrr receive antennas and Ntr transmit antennas. We took into consideration the DF protocol to be implemented at the relay. We assume that all channels are independently and identically distributed Rayleigh fading. The block diagram of the system is depicted in Figure 1. The binary input data sequence is LDPC encoded, then modulated using BPSK or QPSK techniques, converted from series to parallel by the S/P block, applied to an Inverse Fast Fourier Transform (IFFT) block, then converted back to series by the P/S block; finally, the cyclic prefix is added and the resulting signal is transmitted through the channel. At the receiver the inverse operations are performed: the cyclic prefix is removed, the data is converted from series to parallel by the S/P block and applied to a Fast Fourier Transform (FFT) block, then converted back to series by the P/S block, demodulated and LDPC decoded using the sum product algorithm (SPA) algorithm.

2.1. LDPC Coding and Decoding Algorithms

This section describes the LDPC codes and presents the simplified sum-product algorithm for LDPC decoding [48].

2.1.1. LDPC Codes

Channel coding can be defined as converting bit sequence of length k in a codeword of length n, following certain rules imposed by the channel codes. One important class of such codes is the block codes. Therefore, for a (n, k) block code, the channel encoder accepts data in successive blocks of symbols of k length, adds (n − k) redundant symbols algebraically linked to the k message symbols resulting in an encoded block with n symbols called codeword. The block codes have to be linear, in order to reduce the complexity of the encoding process, and have to have a systematic structure, meaning that there is a message part of k information symbols that remains unchanged during the encoding process and a redundant checking part of (n − k) parity-check symbols.
A useful matrix associated with linear block codes is the generator matrix, denoted by G, of (kxn) dimensions
G = [ g 0 g 1 g k 1 ]
In order to fulfill the encoding process, it has to be multiplied with the message vector m
m = [ m 0 , m 1 , , m k 1 ]
to obtain the codeword c = [ c 0 , c 1 , , c n 1 ]
c = m G
Therefore, a codeword c is a linear combination of k basis vectors g i , i = 0 , 1 , , k 1 . A linear systematic (nxk) block code is described by G in the following form
G = [ I k | P ] ,
where I k is the unity matrix of dimension (kxk) and P is the matrix of dimension (kx(n − k)) where the columns represent the positions of parity checks. Therefore, the codeword of a systematic linear block code has the following form
c = [ m | b ] = m [ I k | P ] ,
where b represents the parity-check bits.
Another useful matrix is the parity-check matrix denoted by X of dimensions ((n − k)xn) defined as
X = [ P T I n k ]
and it can be easily seen that
G X T = 0 c X T = 0
which means that the parity-check matrix for a (n, k) linear systematic block code X has a null-space vector of k dimension with basis G .
The LDPC codes belong to the linear block codes family which can be defined by a very sparse parity-check matrix (very few 1 s in each row and column, the rest being all zero) [48] and respect the equations mentioned above. In this paper, we considered regular LDPC codes, with a constant number of 1 s on rows and columns. After the LDPC coding, the resulting codeword is mapped using a signaling constellation M, obtaining a vector s. In this paper, BPSK with M = {1, 1} and QPSK with M = {1 + i, 1 − i, −1 + i, −1 − i} signaling are considered.

2.1.2. Decoding

In the decoding process, the sum-product algorithm (SPA) is being taken into consideration which is a soft decision algorithm that accepts as input the probability of each bit that has been received. This algorithm is based on the factor graph representation of the sparse parity-check matrix, updating iteratively the soft data between check nodes m and variable nodes n [49].
The iterative process for SPA, used for LDPC codes, is summarized as follows [50]:
Step 1. 
Initialization: variable nodes are initialized;
Step 2. 
Update check nodes: a check node m gathers all incoming messages and evaluates the message sent to the variable node n;
Step 3. 
Update variable nodes: a variable node passes the message to all the check nodes in connection with it;
Step 4. 
Decision: all messages of a variable node n that indicates the probability to decode the variable node n to 1 or 0 can be obtained by adding all incoming messages to the variable node n. After each iteration, a soft decision on variable n is taken—decoded as zero or decoded as one. If a valid codeword can be formed, the algorithm stops and the decoding result is out. If not, the algorithm returns to Step 2.
The SPA needs high computational complexity because of the numerous multiplication and division operations made to complete check node updates. Therefore, a simplified version of SPA is being proposed that replaces those operations with additions and subtractions.
In this paper, we take into consideration the simplified SPA algorithm to decode the received data.

2.2. OFDM

Instead of transmitting a high-rate data stream using a single subcarrier, the OFDM technique can be used, which transmits a large number of closely spaced orthogonal subcarriers transmitted in parallel, each subcarrier having a low rate. Figure 1 illustrates the operations made upon a signal to obtain the OFDM symbol.
The input bits are coded and mapped, according to the techniques presented above, to data symbols that are complex numbers representing the modulation constellation points. A serial-to-parallel converter is applied, associating a subcarrier to each OFDM symbol. The next step is to use an Inverse Fast Fourier Transform (IFFT) algorithm on the parallel complex data, that transforms the data into the time domain from the frequency domain. The IFFT block receives L data symbols, L representing the number of subcarriers and the output is L orthogonal sinusoids that form a single OFDM symbol. After a parallel-to-serial conversion, meant to extend the transmission time for L subcarriers from Ts to TOFDM = LTs, where Ts represents the period of the symbol, the OFDM complex signal in base band has the following form in the time domain
s b b ( t ) = l = 0 L 1 s l ( t ) e j l ω l ,
where
ω l = 2 π f l = 2 π T O F D M ,
and
f l = f 0 + Δ ω ,
where f 0 represents the carrier frequency and Δ ω represents the subcarrier spacing, and the shortest duration that accomplishes this requirement is
ω l + 1 ω l = Δ ω = 2 π T O F D M .
To avoid possible occurrence of inter-symbol interference (ISI) between two consecutive OFDM symbols, a guard interval known as cyclic prefix, appended at the beginning of each symbol, is introduced. In order to create the guard interval, either the final part of an OFDM symbol is resumed at the beginning of it, or it is filled with a null signal. In this way, the length of the signal is extended with T c p , meaning T O F D M + T c p , maintaining the orthogonality of the subcarriers.
The next step is to transmit the OFDM signal s c p ( t ) on a carrier frequency f 0 . Therefore, the output of the OFDM transmitter block is
s c p ( t ) = Re { s b b ( t ) e j 2 π f 0 }
After the signal passes through the channel, the OFDM receiver performs the reverse operations performed by the transmitter. Thus, the guard interval is removed, then a serial-to-parallel conversion is performed and the Fast Fourier Transform (FFT) algorithm is used to return to the original spectrum of the transmitted signal, bringing it again from time domain to frequency domain. By applying the parallel-series conversion, the reconstructed data sequence is obtained.

2.3. Multiple Access

The purpose of the multiple access is to increase the number of users that are active at a certain moment, as long as an acceptable level of signal-to-noise and interference ratio (SINR) is maintained. One main concern is the multiuser interference that can appear at the receiver end due to other users interfering with the demodulated one. In order to reduce this phenomenon, the signals transmitted by different users have to be perfectly orthogonal or have low cross-correlation values. There are numerous multiple access techniques that respect or approximate this scenario [51], the performances being measured by means of cross-correlation level, code length and implicit system rate, efficiency of spectrum spreading, sensibility to synchronization issues, and implementation complexity.
The Walsh codes are a set of perfectly orthogonal or zero-correlated codes that can be easily generated at high rates, making them a good candidate in a communication network with a continuously increasing number of users. One main disadvantage is that the Walsh codes are limited by number, so the number of users that can access the system is fixed. Another limitation of the Walsh codes comes from the fact that these codes are periodical signals, which, in frequency domain, leads to spectral lines around which the data are gathered. The spectral spreading is nonuniform, and, furthermore, depends on the chosen code. By contrast, PN codes are not perfectly orthogonal codes, with low partial-correlation between delayed versions of them, when the delay is properly chosen, and also low intercorrelation with other different codes from the same family. The PN codes are used also because they have good spreading properties, the data being spread uniformly within the channel bandwidth, independent of the chosen code.
With both Walsh and PN, the multiple access system has better performances in terms of number of users and cross-correlation properties as the sequences are longer but this leads to a very high rate on the transmission channel and difficulties regarding demodulation due to the increased computational effort [52]. For users that already have a high rate, the channel distortion and fading phenomenon are becoming more severe and additional techniques, like equalization, must be implemented at the receiver, leading to increased complexity and higher costs. Moreover, a long length of the spreading codes may lead to low transmission efficiency and a high transmission delay, thus a potentially long delay at the receiver and high-power consumption [52].
Having as a starting point CDMA, numerous other multiple access techniques have been developed to solve these drawbacks. One of them is MUSA, which uses short complex-valued spreading codes and which, due to additional degrees of freedom offered by the imaginary part, exhibits lower cross-correlation properties than PN and can support a much higher number of users that share the same resource block, basically realizing a superposition process [34]. It facilitates robust SIC implementation and can be nonbinary, compared with traditional CDMA [38].
Binary codes are one type of complex spreading code that can be generated using {1,−1}, for both real and imaginary parts. Therefore, each element of the complex spreading code is found in this set {1 + i, 1 − i, −1 + i, −1 − i}, meaning there are four values used to form a spreading code.
Denoting L as the length of the spreading code, 4L codes can be formed. For example, for a length of 4, there will result 44 or 256 codes, that are not enough for networks in which the number of users is very high [48]. Therefore, there is a need to expand the set from {−1, 1} to {−1, 0, 1} and each element of the complex spreading code is found in this set {−1, −1 − i, −1 + i, −i, 0, i, 1, 1 − i, 1 + i}. This means there are nine values used to form a spreading code, in total being 9L and more suitable for networks nowadays. In case of a very high number of users, instead of {−1, 0, 1}, {−2, −1, 0, 1, 2} can be used and each element of the complex spreading code is found in this set {−2, −2i, −2 − 2i, −2 + 2i, −2 − i, −2 + i, −1 − 2i, −1 + 2i, −1 − i, −1 + i, −1, −i, 0, i, 1, 1 − i, 1 + i, 2, 1 − 2i, 1 − i, 2 − i, 2 + i, 2i, 2 − 2i, 2 + 2i}. Therefore, 25 values are obtained that can be used to form a spreading code, in total being 25L. In this paper, we proposed new sets of complex spreading codes formed from the set {−1, −1 − i, −1 + i, −i, 0, i, 1, 1 − i, 1 + i}. For a length of 4, we obtained groups of 3 orthogonal codes and at least 16 low-correlated spreading codes, presented in Equations (13) and (14). If we increase the length of the spreading code to 8, we obtained groups of 7 orthogonal codes given in Equation (15) and at least 32 low-correlated spreading codes given in Equation (16)
[ i i 1 + i i i 1 i i 1 + i 1 i 1 i 1 ]
and
[ i i i i i i i i i i i i i i i i i i i i 1 + i 1 + i 1 + i 0 1 i 1 i i 1 + i 0 1 + i 1 + i 1 + i i i i i 0 1 + i i 1 + i i i 1 + i 1 + i 1 i i i i i 0 0 0 0 0 0 i 1 + i 1 + i i 0 0 i 1 i 1 i ]
[ i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i ]
and
[ 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 i i i i i 1 1 1 1 i 1 i i i i i 1 1 1 i i 1 1 i i 1 i 1 i 1 1 i 1 1 i i i i i 1 i 1 1 i 1 1 i 1 1 i 1 1 1 i i 1 i 1 1 i 1 1 i 1 1 i 1 1 1 1 1 1 1 1 1 i i i 1 1 1 1 1 1 1 1 1 1 1 i i i i i 1 1 1 1 1 1 1 1 1 i i 1 i i i i i i i i i i i i i 1 1 1 i i i i 1 1 1 1 1 i i i 1 1 1 1 i i i i 1 i i i i 1 1 1 i 1 i 1 i i i i i 1 i i 1 1 i 1 1 1 1 1 i i i i i i i i 1 1 1 1 1 1 1 1 i i i 1 i i i i 1 1 1 ]
The steps followed to obtain the complex spreading codes that formed the matrices presented above are:
Step 1. 
Establish the length of the spreading code depending on the number of users;
Step 2. 
Define the set of values used to obtain the spreading codes starting from {−1, 0, 1};
Step 3. 
Build the matrix that includes all the codes by individually building each vector containing one code with the length established above (for in for a number of times equal to the length of a spreading code);
Step 4. 
Calculate the intercorrelation between codes;
Step 5. 
Find the zero values of the intercorrelation in the matrix obtained above, retrieving the row and column;
Step 6. 
Create a matrix that includes all the codes with zero intercorrelation;
Step 7. 
Complete the matrix, obtained at Step 6, with codes with low correlation, in ascending order of their intercorrelation values;
Step 8. 
Assign the complex codes to the users—first the zero intercorrelation ones and then the ones with low intercorrelation.
Another idea might be to build complex spreading codes starting from PN codes (cPN) whose correlation is very low, lower than the ones obtained from MUSA codes. In this case, the algorithm is simple since all codes have the same intercorrelation values, therefore it is not necessary to sort the codes.
The steps followed to obtain the cPN are:
Step 1. 
Establish the degree of the polynomial depending on the number of users;
Step 2. 
Calculate the length of the polynomial based on its degree;
Step 3. 
Choose the generating polynomial;
Step 4. 
Define a matrix containing all possible initial states of the shift register that generates the PN codes;
Step 5. 
Build the set of complex PN codes that has the real and imaginary parts of two PN codes generated with the same polynomial but different initial conditions from which the users can choose randomly;
Step 6. 
Verify the intercorrelations between the codes from the set of codes;
Step 7. 
Assign the complex codes to the users.

2.4. Relay Transmission

In Figure 2 is represented the proposed architecture of the system. The relay is considered to be ideal since it can communicate with all active users simultaneously and yet treat them separately as there is only one user active at each time instant, in the attempt to minimize possible interferences between active users. This assumption has been made in order to analyze the performance achieved by the base station when the information reaches it through different paths—a direct path and an indirect path, via relay. The noise present on the channel is modeled as additive white Gaussian noise.
The spread signal is sent through the two paths mentioned above to reach the base station [53,54], thus the signal received by relay from the source
y S R , k = P J k s k + n S R , k , k = 1 , 2 , , K
and the signal received at the destination from the source is
y S D , k = k = 1 K P H k s k + n S D , k
where P denotes the power of the signal that is being transmitted; J k represents the channel matrix of the kth mobile terminal (MT), from the MT to relay; s k represents the spread MUSA signal sent by the kth MT; n S R , k represents the Gaussian noise vector of the kth MT, from the MT to relay with zero mean and variance ε [ n S R , k n S R , k H ] = σ S R , k 2 ; H k represents the channel matrix of the kth MT, from MT to BS; n S D , k represents the Gaussian noise vector of the kth MT, from the MT to BS with zero mean and variance ε [ n S D , k n S D , k H ] = σ S D , k 2 .
If the DF protocol is taken into consideration, the signal that reaches the BS coming from the relay is described as
y R D , k = k = 1 K P r ˜ F k y S R , k + n R D , k
and is chosen that
P + P r = 1
where Pr denotes the power of the signal that is being transmitted from the relay to BS and P r ˜ = P r if the relay correctly decoded the signal from MT; F k represents the channel matrix of the kth MT, from relay to BS; n R D , k represents the Gaussian noise vector of the kth MT, from relay to BS with zero mean and variance ε [ n R D , k n R D , k H ] = σ R D , k 2 .
At the base station, there will be two synchronous copies of the same transmitted signal, taking into account the two paths assumed in system configuration. To recover the original data, a maximum ratio combiner is being used whose output is
y = α 1 y S D + α 2 y R D
The channel coefficients, α 1 and α 2 , are described as
α 1 = P H k * σ S D , k
and
α 2 = P r F k * σ R D , k 2
with k = 1 , 2 , , K .

3. Results and Discussion

The performance achieved by the proposed system is evaluated in this section. Extensive simulations have been made in MATLAB using the Monte Carlo technique to increase the degree of confidence in the results. The parameters are summarized in Table 1. The number of transmitting antennas at the relay has been considered as Ntr = 1.
To have a reference, first, we present the performance of an uplink massive MU-MIMO system when active users are separated by Walsh, PN spreading codes and then by complex spreading codes. Simulations with BPSK modulation have been performed too, but the obtained errors were very low and are not presented in the paper.
Figure 3 presents the results obtained by QPSK modulation schemes when the transmission is made over a channel affected by Rayleigh fading using a MIMO configuration of (1 × 26 × 30) and (1 × 30 × 30), with 26 or 30 antennas at the relay, where active users are separated by Walsh codes of 64-length. It can be seen that the best results were obtained when a MIMO configuration of (1 × 30 × 30) was used. It can also be noted that the performance of the system was influenced by an increase of the number of users, because the same resources were being shared so the intercorrelation noise increased. One possibility to maintain a reliable communication is to increase the number of antennas, using the spatial diversity offered by massive MIMO, as we did in our simulations when the number of receive antennas from the relay was increased from 26 to 30.
Figure 4 presents the results obtained in similar conditions, but using PN spreading codes of 63-length instead of Walsh spreading codes. It was expected that the obtained results were slightly poorer because the PN codes were not perfectly orthogonal codes like the Walsh ones, assuming a perfect synchronization at the receiver. However, PN codes are not so sensitive regarding timing synchronization and they can provide a better spectral spreading. The choice, therefore, represents a compromise between the obtained bit error rate, the spectral behavior of the overall signal, and the complexity of the receiver.
Table 2 summarizes the results obtained in the aforementioned simulations, for a fixed value of the SNR equal to 12 dB when the number of active users was 12 and 16, highlighting that the most favorable combination in order to obtain the best performance for our proposed architecture was the one that was using 30 antennas at the relay.
From those results, it can be observed that PN provides poorer results compared to Walsh.
In the above simulations, the length of the Walsh spreading codes was 64 and the length of the PN spreading codes was 63. The question that might rise might be: What should be the minimum length of the complex spreading codes necessary to achieve similar performances, taking into consideration the degrees of freedom offered by the complex part of these codes?
Therefore, in the following simulations, we selected four sets of codes of length 8. For the MUSA set, 32 codes with low correlation properties have been selected, matrix given in Equation (16). For the MUSA0 set, 25 codes with low correlation properties, in ascending order of their intercorrelation value, selected from the MUSA set previously defined, and the rest of the 7 codes have been replaced with ones with zero cross-correlation, also from the matrix given in Equation (16). Then, the extended MUSA (EMUSA) set of codes was created by extending the MUSA and MUSA0 from length 8 to length 32, obtaining thus EMUSA and EMUSA0 sets. The results in terms of BER versus SNR in the same configuration as the one previously used and with (1 × 30 × 30) antennas are shown in Figure 5.
It can be observed that the EMUSA sets obtained, as expected, lower BER than the MUSA sets on the same SNR, the improvement being more significant as the SNR increased, allowing a reduction of number of antennas at the relay or/and base station, but, on the other hand, the system rate increased 4 times, leading to higher spectral occupancy and higher complexity of the receiver. Therefore, depending on the application, a compromise between the processing complexity and the required level of performance has to be made.
Figure 6 and Figure 7 present the BER performances obtained by MUSA and MUSA0, respectively, in similar conditions used for Figure 4 and Figure 5, with K = 12 and 16 active users.
We can easily observe that the new combination of codes reduced significantly the BER performances, the improvement being even more important as SNR increased. This makes, thus, the MUSA and MUSA0 sets good candidates for high-rate users in 5G NOMA-based multiple access systems. Table 3 summarizes the results obtained by two above-mentioned situations, giving the exact BER values at SNR= 12 dB. By comparing these results with the ones presented in Table 2, we can observe also the improvement.
If the complex spreading codes are obtained starting from PN real spreading codes taking into consideration the g 6 + g + 1 generating polynomial, where g is the delay element, following the principles stated in Section 2.3, Figure 8 is obtained. It was considered the most unfavorable situation obtained in the situations above, namely (1 × 26 × 30), when the number of active users was equal to 16. Also, simulations were made in (1 × 10 × 26) and (1 × 10 × 30) configurations, but the BER performance was very low. Thus, a question has arisen: Maintaining the length of the code at 63, how much can we reduce the number of the antennas at the receiver, and therefore the system hardware complexity, such that the performances should be still acceptable (the BER should be below a given threshold)? Thus, the number of antennas at the relay and at the BS was decreased to 10, 8, 4, and then 2. Setting a threshold of 10−4 for the BER, in (1 × 10 × 10) situation, it was reached at SNR = 8 dB, at SNR = 10 dB in the (1 × 8 × 8), and at SNR = 13 dB in the (1 × 4 × 4) situation. This shows that, using these complex PN codes, the number of antennas can be reduced significantly and, therefore, the associated costs.
In order to compare the efficiency of the present approach, we tried to compare our results with similar ones in the existing literature. Thus, in [39], the authors have obtained several results in somewhat similar conditions to our approach but using an MMSE-SIC detector at the receiver and with different numbers of antennas at the receiver and transmitter, an approximate value for BER of 5 × 10−2 was obtained for SNR, for 12 dB, while with our setup, we obtained BER less than 10−3 in all configurations. In [40], the authors obtained an approximate value for BER of 10−4 at a SNR of 12 dB, so in this case, the results were slightly better than MUSA but lower than MUSA0.
In [43], a similar setup has been used, with ½ LDPC codes and QPSK/OFDM modulation, but the codes were the ones used in the 3GPP standard. The number of antennas was (1 × 2), and there was no relay between source and destination, and the channel was affected by AWGN only, obtaining a BER of approximately 5 × 10−2 at SNR = 15 dB for MUSA, 12 users, and of about 5 × 10−3 for overloaded SDMA-OFDMA-MLD.

4. Conclusions

The paper presents the performance obtained by an uplink massive MIMO system with relay as intermediary between source and destination, using LDPC channel coding and OFDM modulation when active users are separated using complex spreading codes from four new sets of codes, MUSA, MUSA0, EMUSA, and EMUSA0. For the MUSA set, 32 codes with low correlation properties have been selected as the intercorrelation should be as low as possible. For the MUSA0 set, 25 codes, in ascending order of their intercorrelation value, have been chosen from the MUSA set previously defined, and the rest of the 7 codes have been replaced with ones with zero cross-correlation. The extended MUSA (EMUSA) set of codes was created by extending the MUSA and MUSA0 from length 8 to length 32, obtaining thus EMUSA and EMUSA0 sets. The results were obtained using the QPSK modulation scheme, when the transmission was made over a channel affected by Rayleigh fading using a MIMO configuration of (1 × 26 × 30) and (1 × 30 × 30), with 26 or 30 antennas at the relay.
The performance was highlighted by comparing them with classical Walsh and PN spreading codes, and the new sets of codes proved to outperform the classical ones. This paper also analyzed the situation in which the number of receive antennas at the relay was different from the number of receive antennas at the destination, and some discussion was made with respect to the compromise that has to be reached between the processing complexity, total rate, and occupied bandwidth and the required level of performances in terms of BER obtained at certain SNRs.
Another novel idea, that was described and tested within this paper, was the one in which complex spreading codes cPN were obtained starting from PN spreading codes. The results obtained are promising, leading to very low BER values, showing that in this case, the number of antennas can be reduced and, thus, the overall system cost.
As future work, we will focus our attention on implementing a higher number of parallel relays between source and destination and comparing their performance when using DF or amplify-and-forward (AF) protocols and trying to find a compromise between performance, hardware, and a low cost of implementation.

Author Contributions

Conceptualization, M.-G.B., C.F., and S.H.; methodology, M.-G.B. and C.F.; software, M.-G.B.; validation, M.-G.B., C.F., and S.H.; formal analysis, M.-G.B. and C.F.; investigation, M.-G.B. and C.F.; resources, M.-G.B., C.F., and S.H.; writing—original draft preparation, M.-G.B., C.F., and S.H.; writing—review and editing, M.-G.B., C.F., and S.H.; visualization, M.-G.B. and C.F.; supervision, M.-G.B. and S.H.; project administration, M.-G.B. and S.H.; All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by University Politehnica of Bucharest PubArt funding program.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sinaie, M.; Ng, D.W.K.; Jorswieck, E.A. Resource Allocation in NOMA Virtualized Wireless Networks Under Statistical Delay Constraints. IEEE Wirel. Commun. Lett. 2018, 7, 954–957. [Google Scholar] [CrossRef]
  2. Yu, Y.; Chen, H.; Li, Y.; Ding, Z.; Vucetic, B. Antenna selection for MIMO-NOMA networks. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  3. Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.; Chih-Lin, I.; Poor, H.V. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef] [Green Version]
  4. Ding, Z.; Lei, X.; Karagiannidis, G.K.; Schober, R.; Yuan, J.; Bhargava, V.K. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends. IEEE J. Sel. Areas Commun. 2017, 35, 2181–2195. [Google Scholar] [CrossRef] [Green Version]
  5. Baidas, M.W.; Alsusa, E.; Hamdi, K.A. Performance analysis of downlink NOMA networks over Rayleigh fading channels. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
  6. Mohammadi, M.; Mobini, Z.; Suraweera, H.A.; Ding, Z. Antenna Selection in Full-Duplex Cooperative NOMA Systems. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, KS, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  7. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-Lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  8. Wei, Z.; Zhao, L.; Guo, J.; Ng, D.W.K.; Yuan, J. Multi-Beam NOMA for Hybrid mmWave Systems. IEEE Trans. Commun. 2018, 67, 1705–1719. [Google Scholar] [CrossRef] [Green Version]
  9. Wang, H.; Zhang, R.; Song, R.; Leung, S.-H. A Novel Power Minimization Precoding Scheme for MIMO-NOMA Uplink Systems. IEEE Commun. Lett. 2018, 22, 1106–1109. [Google Scholar] [CrossRef]
  10. Shirvanimoghaddam, M.; Dohler, M.; Johnson, S.J. Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations. IEEE Commun. Mag. 2017, 55, 55–61. [Google Scholar] [CrossRef] [Green Version]
  11. Shirvanimoghaddam, M.; Condoluci, M.; Dohler, M.; Johnson, S.J. On the Fundamental Limits of Random Non-Orthogonal Multiple Access in Cellular Massive IoT. IEEE J. Sel. Areas Commun. 2017, 35, 2238–2252. [Google Scholar] [CrossRef]
  12. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Commun. Surv. Tutorials 2016, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
  13. Kiani, A.; Ansari, N. Edge Computing Aware NOMA for 5G Networks. IEEE Internet Things J. 2018, 5, 1299–1306. [Google Scholar] [CrossRef]
  14. Giang, H.T.H.; Hoan, T.N.K.; Thanh, P.D.; Koo, I. Hybrid NOMA/OMA-Based Dynamic Power Allocation Scheme Using Deep Reinforcement Learning in 5G Networks. Appl. Sci. 2020, 10, 4236. [Google Scholar] [CrossRef]
  15. Le, M.T.P.; Ferrante, G.C.; Caso, G.; De Nardis, L.; Di Benedetto, M.-G. On information-theoretic limits of code-domain NOMA for 5G. IET Commun. 2018, 12, 1864–1871. [Google Scholar] [CrossRef]
  16. Le, M.T.P.; Ferrante, G.C.; Quek, T.Q.S.; Di Benedetto, M.-G. Fundamental Limits of Low-Density Spreading NOMA with Fading. IEEE Trans. Wirel. Commun. 2018, 17, 4648–4659. [Google Scholar] [CrossRef] [Green Version]
  17. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Nonorthogonal Multiple Access for 5G and Beyond. Proc. IEEE 2017, 105, 2347–2381. [Google Scholar] [CrossRef] [Green Version]
  18. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A Survey of Non-Orthogonal Multiple Access for 5G. IEEE Commun. Surv. Tutorials 2018, 20, 2294–2323. [Google Scholar] [CrossRef] [Green Version]
  19. Ping, L.; Liu, L.; Wu, K.; Leung, W.K. Interleave division multiple-access. IEEE Trans. Wirel. Commun. 2006, 5, 938–947. [Google Scholar] [CrossRef] [Green Version]
  20. Fang, N.; Huang, Y.-C.; Ding, Z.; Geraci, G.; Shieh, S.-L.; Claussen, H. Lattice Partition Multiple Access: A New Method of Downlink Non-Orthogonal Multiuser Transmissions. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  21. Wu, Y.; Wang, C.; Chen, Y.; Bayesteh, A. Sparse Code Multiple Access for 5G Radio Transmission. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 24–27 September 2017; pp. 1–6. [Google Scholar]
  22. Al-Nahhal, I.; Dobre, O.A.; Basar, E.; Ikki, S.S. Low-Cost Uplink Sparse Code Multiple Access for Spatial Modulation. IEEE Trans. Veh. Technol. 2019, 68, 9313–9317. [Google Scholar] [CrossRef] [Green Version]
  23. Tao, Y.; Liu, L.; Liu, S.; Zhang, Z. A survey: Several technologies of non-orthogonal transmission for 5G. China Commun. 2015, 12, 1–15. [Google Scholar] [CrossRef]
  24. 3GPP R1-164688, Resource Spread Multiple Access. May 2016.
  25. Dai, X.; Zhang, Z.; Bai, B.; Chen, S.; Sun, S. Pattern Division Multiple Access: A New Multiple Access Technology for 5G. IEEE Wirel. Commun. 2018, 25, 54–60. [Google Scholar] [CrossRef]
  26. Chen, S.; Sun, S.; Kang, S.; Ren, B. Pattern Division Multiple Access (PDMA). In Multiple Access Techniques for 5G Wireless Networks and Beyond; Springer: Boston, MA, USA, 2018; pp. 451–492. [Google Scholar]
  27. Chunlin, Y.; Zhifeng, Y.; Weimin, L.; Yifei, Y. Non⁃Orthogonal Multiple Access Schemes for 5G. ZTE Commun. 2016, 14, 11–16. [Google Scholar]
  28. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  29. Higuchi, K.; Benjebbour, A. Non-orthogonal Multiple Access (NOMA) with Successive Interference Cancellation for Future Radio Access. IEICE Trans. Commun. 2015, 403–414. [Google Scholar] [CrossRef] [Green Version]
  30. Caire, G.; Shamai, S. On the achievable throughput of multi-antenna Gaussian broadcast channel. IEEE Trans. Inf. Theory 2003, 49, 1692–1706. [Google Scholar] [CrossRef]
  31. Li, A.; Benjebbour, A.; Chen, X.; Jiang, H.; Kayama, H. Uplink Non-Orthogonal Multiple Access (NOMA) with Single-Carrier Frequency Division Multiple Access (SC-FDMA) for 5G Systems. IEICE Trans. Commun. 2015, 1426–1435. [Google Scholar] [CrossRef]
  32. Benjebbour, A. An overview of Non⁃Orthogonal Multiple Access. ZTE Commun. 2017, 15, 21–30. [Google Scholar]
  33. 3GPP Standard, R1-16222. Discussion on Multiple Access for New Radio Interface, ZTE. Available online: https://www.3gpp.org/DynaReport/TDocExMtg--R1-84b--31661.htm (accessed on 1 September 2020).
  34. 3GPP Standard, RP-160279. Motivation for New Study Item on Uplink Non-Orthogonal Transmission for Massive MTC in LTE, ZTE. Available online: https://portal.3gpp.org/ngppapp/TdocList.aspx?meetingId=31637 (accessed on 1 September 2020).
  35. 3GPP Standard, R1-164270. Receiver Implementation for MUSA, ZTE. Available online: https://www.3gpp.org/DynaReport/TDocExMtg--R1-85--31662.htm (accessed on 1 September 2020).
  36. Wang, B.; Wang, K.; Lu, Z.; Xie, T.; Quan, J. Comparison study of non-orthogonal multiple access schemes for 5G. In Proceedings of the 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, Orlando, FL, USA, 17–19 June 2015; pp. 1–5. [Google Scholar]
  37. Yuan, Z.; Yu, G.; Li, W.; Yuan, Y.; Wang, X.; Xu, J. Multi-User Shared Access for Internet of Things. In Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, 5–18 May 2016; pp. 1–5. [Google Scholar]
  38. Yuan, Z.; Yan, C.; Yuan, Y.; Li, W. Blind Multiple User Detection for Grant-Free MUSA without Reference Signal. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 24–27 September 2017; pp. 1–5. [Google Scholar]
  39. Yuan, Z.; Hu, Y.; Li, W.; Dai, J. Blind Multi-User Detection for Autonomous Grant-Free High-Overloading Multiple-Access without Reference Signal. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–7. [Google Scholar]
  40. Yuan, Z.; Li, W.; Hu, Y.; Tang, H.; Dai, J.; Ma, Y. Blind Multi-user Detection Based on Receive Beamforming for Autonomous Grant-Free High-Overloading Multiple Access. In Proceedings of the 2019 IEEE 2nd 5G World Forum (5GWF), Dresden, Germany, 30 September–2 October 2019; pp. 520–523. [Google Scholar]
  41. Kim, H.; Lim, Y.-G.; Chae, C.-B.; Hong, D. Multiple Access for 5G New Radio: Categorization, Evaluation, and Challenges. arXiv 2017, arXiv:1703.09042. [Google Scholar]
  42. Eid, E.M.; Fouda, M.M.; Eldien, A.S.T.; Tantawy, M.M. Performance analysis of MUSA with different spreading codes using ordered SIC methods. In Proceedings of the 2017 12th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 18–19 December 2017; pp. 101–106. [Google Scholar]
  43. Okamoto, E.; Mikami, M.; Yoshino, H. Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels. IEICE Trans. Commun. 2019, 1458–1466. [Google Scholar] [CrossRef]
  44. Ma, Y.; Yuan, Z.; Hu, Y.; Li, W. A Real Fourier-Related Transform Spreading OFDM Multi-User Shared Access System. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–5. [Google Scholar]
  45. Oyerinde, O.O. Comparative Study of Overloaded and Underloaded NOMA Schemes with Two Multiuser Detectors. In Proceedings of the 2019 IEEE 2nd Wireless Africa Conference (WAC), Pretoria, South Africa, 18–20 August 2019; pp. 1–5. [Google Scholar]
  46. Yu, H.-Y.; Yu, H.-Y.; Wang, D. Channel and Bit Adaptive Power Control Strategy for Uplink NOMA VLC Systems. Appl. Sci. 2019, 9, 220. [Google Scholar] [CrossRef] [Green Version]
  47. Magueta, R.; Teodoro, S.; Castanheira, D.; Silva, A.; Dinis, R.; Gameiro, A. Multiuser Equalizer for Hybrid Massive MIMO mmWave CE-OFDM Systems. Appl. Sci. 2019, 9, 3363. [Google Scholar] [CrossRef] [Green Version]
  48. Papaharalabos, S.; Sweeney, P.; Evans, B.; Mathiopoulos, P.; Albertazzi, G.; Coralli, A.V.; Corazza, G. Modified sum-product algorithms for decoding low-density parity-check codes. IET Commun. 2007, 1, 294. [Google Scholar] [CrossRef]
  49. Kschischang, F.R.; Frey, B.J.; Loeliger, H.-A. Factor graphs and the sum-product algorithm. IEEE Trans. Inf. Theory 2001, 47, 498–519. [Google Scholar] [CrossRef] [Green Version]
  50. Yang, P.-H.; Chen, J.-C.; Chan, Y.-T.; Lin, M.-Y. A simplified addition operation Log-SPA LDPC decoder. In Proceedings of the 2008 14th Asia-Pacific Conference on Communications, Akihabara, Tokyo, Japan, 14–16 October 2008; pp. 1–4. [Google Scholar]
  51. Hassan, A.A.; Hershey, J.E.; Saulnier, G.J. Spreading Sequence Design. In Perspectives in Spread Spectrum; Springer: Boston, MA, USA, 1998; Volume 459, pp. 1–33. [Google Scholar]
  52. 3GPP Standard, R1-164269. Grant-Free Multiple Access for mMTC Based on Short Spreading, ZTE. Available online: https://www.3gpp.org/DynaReport/TDocExMtg--R1-85--31662.htm (accessed on 1 September 2020).
  53. Voicu, C.F.; Berceanu, M.-G.; Halunga, S. The use of relays in uplink MU Massive-MIMO system. Adv. Top. Optoelectron. Microelectron. Nanotechnol. IX 2018, 10977, 1097722. [Google Scholar] [CrossRef]
  54. Garcia, C.E.; Camana, M.R.; Koo, I. Secrecy energy efficiency maximization in an underlying cognitive radio–NOMA system with a cooperative relay and an energy-harvesting user. Appl. Sci. 2020, 10, 3630. [Google Scholar] [CrossRef]
Figure 1. Receive and transmit operations.
Figure 1. Receive and transmit operations.
Applsci 10 07139 g001
Figure 2. The architecture of the proposed system.
Figure 2. The architecture of the proposed system.
Applsci 10 07139 g002
Figure 3. BER vs. SNR for (1 × 26 × 30) and (1 × 30 × 30) MIMO configurations, QPSK modulation, Walsh codes with 12, 16 active users.
Figure 3. BER vs. SNR for (1 × 26 × 30) and (1 × 30 × 30) MIMO configurations, QPSK modulation, Walsh codes with 12, 16 active users.
Applsci 10 07139 g003
Figure 4. BER vs. SNR for a (1 × 26 × 30) and (1 × 30 × 30) MIMO configurations, QPSK modulation, PN code with 12, 16 active users.
Figure 4. BER vs. SNR for a (1 × 26 × 30) and (1 × 30 × 30) MIMO configurations, QPSK modulation, PN code with 12, 16 active users.
Applsci 10 07139 g004
Figure 5. BER vs. SNR for a (1 × 30 × 30) MIMO configuration, QPSK modulation, MUSA and EMUSA complex spreading codes with 16 active users.
Figure 5. BER vs. SNR for a (1 × 30 × 30) MIMO configuration, QPSK modulation, MUSA and EMUSA complex spreading codes with 16 active users.
Applsci 10 07139 g005
Figure 6. BER vs. SNR for a (1 × 26 × 30) and (1 × 30 × 30) MIMO configurations, QPSK modulation, MUSA with 12, 16 active users.
Figure 6. BER vs. SNR for a (1 × 26 × 30) and (1 × 30 × 30) MIMO configurations, QPSK modulation, MUSA with 12, 16 active users.
Applsci 10 07139 g006
Figure 7. BER vs. SNR for a (1 × 26 × 30) and (1 × 30 × 30) MIMO configuration, QPSK modulation, MUSA0 with 12, 16 active users.
Figure 7. BER vs. SNR for a (1 × 26 × 30) and (1 × 30 × 30) MIMO configuration, QPSK modulation, MUSA0 with 12, 16 active users.
Applsci 10 07139 g007
Figure 8. BER vs. SNR for a (1 × 2 × 2), (1 × 4 × 4), (1 × 8 × 8), and (1 × 10 × 10) MIMO configuration, QPSK modulation, cPN with 16 active users.
Figure 8. BER vs. SNR for a (1 × 2 × 2), (1 × 4 × 4), (1 × 8 × 8), and (1 × 10 × 10) MIMO configuration, QPSK modulation, cPN with 16 active users.
Applsci 10 07139 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterTechniqueValue
Channel codingLDPC1/2
ModulationQPSK-
ChannelRayleigh-
FFT size-64
Number of data subcarriers-52
Multiple accessWalsh,
PN,
MUSA
64-length,
64-length,
8-length
Signal-to-noise ratio-0–20 dB
Number of users-12, 16
User overload-150%, 200%
MIMO configurations
(Nt × Nrr × Nr)
-(1 × 6 × 30),
(1 × 30 × 30)
DetectorsMMSE-
Table 2. BER vs. SNR for Walsh and PN spreading codes for SNR = 12 dB.
Table 2. BER vs. SNR for Walsh and PN spreading codes for SNR = 12 dB.
(1 × 26 × 30)
K = 12
(1 × 30 × 30)
K = 12
(1 × 26 × 30)
K = 16
(1 × 30 × 30)
K = 16
Walsh0.00065930.00010830.0046570.001846
PN0.0015930.00059980.0064060.00559
Table 3. BER vs. SNR for MUSA and MUSA0 for SNR = 12 dB.
Table 3. BER vs. SNR for MUSA and MUSA0 for SNR = 12 dB.
(1 × 26 × 30)(1 × 30 × 30)
MUSA0.0018520.0005036
MUSA00.00087269.014 × 10−5

Share and Cite

MDPI and ACS Style

Berceanu, M.-G.; Florea, C.; Halunga, S. Performance Comparison of Massive MIMO System with Orthogonal and Nonorthogonal Multiple Access for Uplink in 5G Systems. Appl. Sci. 2020, 10, 7139. https://doi.org/10.3390/app10207139

AMA Style

Berceanu M-G, Florea C, Halunga S. Performance Comparison of Massive MIMO System with Orthogonal and Nonorthogonal Multiple Access for Uplink in 5G Systems. Applied Sciences. 2020; 10(20):7139. https://doi.org/10.3390/app10207139

Chicago/Turabian Style

Berceanu, Madalina-Georgiana, Carmen Florea, and Simona Halunga. 2020. "Performance Comparison of Massive MIMO System with Orthogonal and Nonorthogonal Multiple Access for Uplink in 5G Systems" Applied Sciences 10, no. 20: 7139. https://doi.org/10.3390/app10207139

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop