Next Article in Journal
Robust Motion Planning in Robot-Assisted Surgery for Nonlinear Incision Trajectory
Previous Article in Journal
A Study on the Development of a White Light Source Module for a Large-Capacity Searchlight Using a Blue Laser Diode
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing MIMO Spatial-Multiplexing and Parallel-Decoding under Interference by Computational Feedback

1
Faculty of Engineering, Ariel University, Ariel 40700, Israel
2
Department of Computer Sciences, Lev Academic Center, Jerusalem College of Technology, Jerusalem 9372115, Israel
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(3), 761; https://doi.org/10.3390/electronics12030761
Submission received: 11 January 2023 / Revised: 29 January 2023 / Accepted: 31 January 2023 / Published: 2 February 2023
(This article belongs to the Special Issue Massive MIMO Systems for 5G and beyond Networks)

Abstract

:
In this paper, we propose a new digital Hard-Successive-Interference-Cancellation (HSIC), the Alternating Projections-HSIC (AP-HSIC), an innovative fast computational feedback algorithm that deals with various destructive phenomena from different types of interferences. The correctness and convergence of the proposed algorithm are provided, and its complexity is given. The proposed algorithm possesses the functionality of canceling digital interference without the aid of physical feedback between the receiver and the transmitter or the loading of learning information about the state of the Multiple Input–Multiple Output (MIMO) channel to the transmitter. The proposed AP-HSIC algorithm enables a parallel decoding process from the parallel transmission of Orthogonal- Space–Time-Block-Coding (OSTBC) under a complex and challenging wireless environment to facilitate the Dynamic Spectrum Sharing (DSS) capability. We present a performance comparison of the proposed algorithm with the algorithm for Multi-Group-Space–Time-Coding (MGSTC) under MIMO fading channels and general interference or high-level Additive White Gaussian Noise (AWGN). Mathematical analysis and real-time simulations show the advantages of the proposed algorithm compared to the MGSTC decoding algorithm.

1. Introduction

Dynamic and shared-spectrum-access techniques are among the most challenging approaches in advanced modern wireless communication. Examples of technologies implementing dynamic spectrum spatial capabilities are 5th-Generation New-Radio (5G-NR)-Heterogeneous-Network (HetNet) [1,2], 6th-Mobile-Generation [3], and Wi-Fi-6,7,8 802.11.ax-be. Moreover, dealing with multi-interference signals, Over-the-Air (OTA) in the domains of space, time, and frequency, or coping with jamming attacks that strongly correlate with transmission signals, and simultaneously integrating the application of modern MIMO techniques poses challenging issues. Existing solutions to these problems include: intelligent access [4,5], intelligent SIC [6,7,8,9,10,11], smart management sharing systems, and dynamic-cognitive-radio-spectra [12,13,14].
More and more systems in both the civilian and military fields are required to deal with multi-path phenomena and diverse sources of interference in conjunction with ultra-reliability and low-air transport requirements [2]. In the advanced modern communication field, several users per urban area and the number of mobile operators conducting Stand-Alone (SA) unlicensed communications are massive and intensifying. This process of congestion leads to the destruction of wireless channels, causing bad conditions for wave propagation [15], scattering phenomena [16], and interference-jamming problems [17,18,19]. The meaning of the destruction of wireless channels is that there is a strong correlation between the desired signal and the interference signal that causes a significant reduction in the complex power gain of the wireless links. In designing next-generation communication systems, it is necessary to consider these decoding and fairness problems in addition to dealing with these destructive effects.
Two main approaches have been developed in recent years to deal with the challenges of offsetting the destructive effects of various sources of interference. The capabilities of those approaches combine spatial selectivity and wireless communication techniques that increase the channel’s capacity and bring about accurate and fast decoding processes. The two main approaches can be classified as follows: classical conventional and non-conventional analog–digital-SIC approach [7,20] or None-Orthogonal-Multiple-Access (NOMA) techniques [21,22,23], and advanced MIMO-beamforming techniques such as analog–digital hybrid-beamforming structure [24,25,26], and multi-layer-precoding full-dimensional massive MIMO systems [14,27].
The first approach includes three different families of decoders incorporating interference offset algorithms. The first family has algorithms such as classical analog–digital-SIC [7,20,28], zero forcing-interference cancellation (ZF-IC) [29], MGSTC [29,30,31], and SIC based on machine-learning/deep-learning algorithms such as SICnet [28] and-deepSIC [7]. The main advantage of these techniques is the absence of the requirement for physical feedback between the receiver and the transmitter to share the information evaluation of the wireless channel with the transmitter (e.g., the Channel-State-Information-at-the-Transmitter (CSIT)). The common denominator of this family is based on serial process decoders designed for the spatial separation of a block of information intended for a specific user from a system of simultaneously transmitted blocks. The coalition of the remaining blocks considered internal interferences are serially offset to decode the desired block. These methods are limited in dealing with interference processes from external interferers, such as neighboring users who produce a strong correlation with the signals of the desired transmitter or an intelligent jammer activated in the same geographic-spatial space. The reason for this weakness is that the external disturbance process causes a violation of the legality of the internal offset process predefined in the SIC algorithm. This process damages the iterative decoding process and significantly damages the system’s performance (as we prove in the next section).
The second family is the NOMA technique. The NOMA is based on multi-carrier power control, which allows identifying each user’s reception power values or power coefficients according to their differences in power-multiplexing. This method is also vulnerable to external interference from outside the network or from the source of an intelligent jammer. These interferences disrupt the spatial separation process, which is based on differentiating the reception power of each user.
The third family is based on minimum-mean-square detection interference-rejection combiner (MMSE-IRC) [32]. The conventional MMSE-IRC enables spatial selectivity, as well as dealing with neighboring users who produce complex disturbances within the legal framework of the network, a high order of diversity, and advanced spatial pluralism. The MMSE-IRC is limited in the aspect of eliminating the outsourcing of dynamic interference and dealing with destructive wireless effects because the construction of the system mechanisms is heavily based on None-Stand-Alone (NSA) networks or on network-based regulation protocols, with the help of Physical-Upload-Share-Channel (PUSHC), and auxiliary Demodulation-Reference-Signals (DM-RS) [1,2].
The second approach is high-resolution beamforming techniques [33], hybrid beamforming  [4,24], analog–digital-beamforming, and multi-layer-precoding full-dimensional massive MIMO systems [34]. This approach’s disadvantage is that the receiver must share with the transmitter CSIT via physical feedback that might be vulnerable. As a result, the ability of an intelligent jammer or a general disturbance to damage the CSIT is natural and exists in physical reality. The balance between the need to develop systems without closed feedback and the development of advanced feedback-based methods is derived from considerations of the need to implement real-time communication, communication with minimal computational overhead, and constraints of physical conditions that cannot connect physical feedback between the receiver and the transmitter. Examples of such systems with physical constraints and limitations are satellite communication systems, critical wireless links (for example, medical systems based on wireless communication), and autonomous vehicles.
In this paper, we propose a new digital interference cancellation algorithm—the AP-HSIC—that only requires the Channel-State-Information-at-the-Receiver (CSIR) assumption and generates computational feedback at the receiver. This computational feedback can overcome the effects of random scatters in a multi-path fading channel and quasi-static Flat-Rayleigh-Fading MIMO channels, combined with high-level AWGN and general interference scenarios. We compare the MGSTC decoding algorithm’s performance based on the MIMO array’s serial-decoding mode and the proposed algorithm, AP-HSIC, which combines parallel processing decoding methods in the MIMO array. This comparison was conducted in an environment of different interferers. The comparison is reflected in the performance levels of Bit–Error Ratio (BER) vs. the Signal-to-Noise Ratio (SNR) or BER vs. Signal-to-Interference Ratio (SIR).
The analysis considers different constellation orders (Quadrature Phase Shift Keying (QPSK); 8-PSK; and 16-PSK) and challenges the two systems under scenarios of high-level AWGN and two kinds of interference: Partial Band Noise (PBN) [35] and general interference [1]. The presence of general interfering signals can be associated with neighboring users or jamming attacks [17].
The proposed AP-HSIC can generate significant capabilities for successfully canceling digital interference. The AP-HSIC offers flexibility regarding stand-alone (SA) networks without the request to control a sharing channel that statistically measures the spatial domain. The receiver also does not require any control or physical feedback from the transmitter. In addition, AP-HSIC can decode symbols in a parallel MIMO mode in real-time without slowing down the decoding process and simultaneously with the interference cancellation process. These features are significant in applying ultra-bit-rate and heavy-capacity channel requirements. It has the ability to discern between the original channel response matrix and interfering factors. The next section defines these factors as the interrupting part, Δ H , where we show how to calculate an approximation to Δ H and perform an online update to the general MIMO channel response matrix. The computation of Δ H allows a total offset of the interference signal. The result is that the system can decode the originally transmitted symbols without increasing the power and re-transmitting. We may assume statistical dependence between the general interference (or the jamming signal) and the user signal, as well as statistical dependence between the AWGN and the user signal. Furthermore, with the knowledge of the CSIR, we can distinguish between a signal that transmits data from an interference signal without changing to pilot symbols, changing modulation, or increasing the transmission power.
The common denominator of advanced wireless communication systems that include interference offset techniques and innovative parallel decoding algorithms is that the network operates in Time-Division-Duplex (TDD) communication mode. A significant advantage of this mode is in the abstraction of the ability to evaluate the wireless channel and reduce the information overhead between the transmitter and the receiver. The significant and growing problem with this mode is that it is weak against interference or neighboring users in the space. The considerable advantages of the proposed algorithm are not only that it allows information to be decoded in a parallel manner at the same time as the offset of the interferers without the need for physical feedback between the transmitter and the receiver, but it also allows applicability to communication systems that are unable to produce physical feedback due to considerations of system architecture, critical response time, etc. Examples of this applicability are satellite systems, autonomous vehicles, and ultra-low latency wireless systems. The proposed algorithm allows these systems to transmit high data rates in a high order of modulations and simultaneously decode them under diverse interfering scenarios and under TDD mode.
The remainder of the paper is organized as follows: Section 2 presents the proposed communication MIMO model under various interference scenarios. Section 3 presents the AP-HSIC algorithm, where we prove its correctness, prove its convergence, and analyze its complexity. Section 4 describes the real-time simulations and numerical results based on SIMULINK and MATLAB platforms and provides a comparison of the performances of both systems: the MGSTC and the AP-HSIC. In Section 5, we derive conclusions and a vision for further research on efficient solutions to communication system problems under interfering scenarios.

2. Proposed Communication MIMO Model under Various Interference

This section describes and analyzes a proposed communication MIMO model under various interference scenarios for two different architectures. The first architecture includes a transmitter based on the MGSTC scheme, including the diversity-transmitting technique-OSTBC. The receiver is based on the MGSTC decoding algorithm. This architecture is described in [29]. The MGSTC has the property of interference cancellation and decoding capability with the ability to separate a single symbol information block from a set of transmitted blocks and combines an error-reducing mechanism. The MGSTC technique works by iterating a serial decoding mode in the receiver. It includes the parallel transmission of a series of blocks in space and, on the receiver side, a serial decoding capability that separates the various transmitted blocks.
In this architecture, as we mentioned, the MGSTC decoding algorithm decodes and de-multiplexes the individual data streams in a specific user from the other streams and creates, through serial iterations (i.e., multi-stage decoding), a communication mode capable of offsetting the noise part (a sum of AWGN with the rest of the broadcast blocks). This process is performed by utilizing the accuracy of a single decoding stream relative to the last decoding iteration.
There are two distinct advantages of the MGSTC decoding algorithm. The first one is based on the fact that, at the end of each iteration, when we move to the next group order, the MGSTC scheme produces a diversity gain for every matrix of OSTBC transmission modulation symbols, S c i ( S c i included c i MGSTC component-block as i = 1 , , I ). The diversity gain is increased by n i × n 1 + + n i + N r N t when the i is the iteration number and n i is the number of transmission antennas in the i’th group, while N r , and N t are the number of total receiver antennas and the number of total transmission antennas, respectively.
Having the ability to raise the diversity order means being able to reduce the average power transmission of each group inversely to the diversity order of each group; for example, the average power per symbol transmission at antennas 1 and 2 in the first group is defined as E s , and the diversity order is 4, the average power per symbol at antennas 3 and 4 will be E s 2 , with diversity order of 8. The second advantage is based on the fact that in each given iteration, as the iteration process continues forward, the decoding accuracy increases, a process that results in the elimination of the noise part in relation to the previous iteration.
The challenging issue in the MGSTC and in multi-stage decoding, in general, is that the advantages become disadvantages in several communication scenarios. Those advantages, as mentioned above, at the same time, lead to disadvantages for MGSTC systems when interference cases are present in the same spatial domain. The disadvantages, reflected in the SIC process of the MGSTC, are based on it being a serial decoding mode of data blocks. Every error accumulated in a given SIC process is dragged into the next iteration and amplified. Another significant weakness of the MGSTC is the wireless links between the antenna couples in the descending order of the antenna array of the transmitter (e.g., antennas 5 and 6 in our simulation) to all antenna arrays of the receiver. The weakness arises from the fact that these paths are more attenuated in terms of the SNR or SIR and because of the reliance on diversity gain. Thus, in the presence of interfering signals, fading effects, or high levels of AWGN that hit these paths, an imbalance in the trade-off between a higher diversity gain and lower SNR occurs, leading to increased values of BER.
We propose the second architecture using the MGSTC-OSTBC at the transmitter and the AP-HSIC scheme at the receiver instead of the MGSTC decoding algorithm. This proposed hybrid scheme produces immunity against various interference scenarios, as can be seen in the simulation results below. In addition, a more efficient and accurate process of parallel spatial decoding of the series of simultaneously transmitted symbols blocks is achieved in this scheme compared to the first scheme we described.
We separately analyze and simulate the two architectures under three challenging interference scenarios acting in the same spatial domain. The first interference scenario is a high-leveled AWGN. The second scenario is PBN, and the third scenario is a general interference simulating a smart jamming device or a neighboring user.
We start the first and essential analysis with the general interference case. In that case, the communication standard ideal model Y = H S c i + Z changes to (see [29]):
Y = P H T R S c i + P S I R H J R S J + P S N R Z ,
where Y is the received signal, with dimensions N r × k , N r is the number of receiver antennas, and k is the number of sample symbols per frame. The MIMO channel response matrix between the transmitter and receiver is H T R , with dimensions N r × N t , where N t is the number of transmission antennas. The MIMO channel-response matrix between the interference and the receiver is defined by H J R , with dimensions N r × N J , where N J is the number of interference transmission antennas. S c i is the matrix of OSTBC transmission modulation symbols of the desired transmission, with dimensions N t × k and S J is the matrix of OSTBC interference modulation symbols, with dimensions N J × k . Finally, the S I R is the signal interference ratio, P is the total transmission power, and Z is the independent complex Gaussian random variable noise. The model communication is described in Figure 1.
For the MGSTC decoding algorithm, in the presence of the interference signal, Y ˜ c 1 , [29] becomes:
Y ˜ c 1 = Θ c c 1 Y = Θ c c 1 P H T R S c i + P S I R H J R S J + P S N R Z = P Θ c c 1 H T R S c i + Θ c c 1 P S I R H J R S J + P S N R Z ˜ c c 1
where Y ˜ c 1 is the receive-matrix for decoding the first symbol-block, S c 1 . Θ c c 1 is the null space matrix relative to the decoding process of S c 1 , and Z ˜ c c 1 is the independent complex Gaussian random variable noise multiplied with the null space matrix, Θ c c 1 .
The second part of this equation, the interference that is received as an additive factor to the MGSTC decoding algorithm, produces the most destructive effects as it destroys the orthogonality of Θ c c 1 relative to the other part of the MIMO channel-response matrix–destruction that the MGSTC algorithm cannot deal with (see [36]).
In order to solve the problem of interference estimation and digital interference cancellation in the presence of general interference by using self-computational feedback at the receiver, we describe two main approaches with different assumptions to model the interference intervention. The first approach is based on the assumption that the number of interference transmission antennas and the number of legitimate transmission antennas are different, implying that there exists no correlating matrix Ψ such that S J = Ψ S c i , and therefore we do not have any information about the interference tactic. The second approach is applied under the assumption that there exists a correlation unknown matrix Ψ such that S J = Ψ S c i . Under the most general assumption, writing S c i = S , we can decompose (1) into:
Y = P H T R S + P S I R H J R S J + P S N R Z = P H T R S + P S I R H J R S J I S + S + S + S + P S N R Z = P H T R + P S I R H J R S J S + S + P S I R H J R S J I S + S + P S N R Z ,
where S + is the Moore–Penrose pseudo-inverse of S. Multiplying from the right by S + S , we obtain:
Y S + S = P H T R + P S I R H J R S J S + S + P S N R Z S + S ,
since S + S S + = S + (which implies I S + S S + S = 0 , see Remark 1) and since S S + S = S .
Let the interference factor be defined by:
Δ H = P S I R H J R S J S + .
Furthermore, let
H = P H T R ,
and Z ˜ = P S N R Z S + S .
Now, Z ^ : = P S N R Z CMN m × k 0 m × k , σ m I m , σ k I k , where σ = σ Z ^ = P S N R , which implies that Z ˜ CMN m × k 0 m × k , σ m I m , σ k S + S . We therefore have
σ Z ˜ 2 = σ 2 k t r a c e S + S σ 2 ,
since t r a c e S + S = r a n k S + S = r a n k S N t and N t k (whatever the coding modulation is, using the fact that S + S is Hermitian with simple eigenvalues from the set 0 , 1 ). The last implies that we reduce the noise part by multiplying with S + S , assuming that k is large enough.
We therefore have
Y S + S = H + Δ H S + Z ˜ .
Note that when a correlation matrix Ψ exists such that S J = Ψ S , then S J I S + S = Ψ S I S + S = 0 and (3) is equivalent to
Y = P H T R + P S I R H J R S J S + S + P S N R Z ,
which we write as:
Y = H + Δ H S + Z ˜ ,
where Z ˜ = P S N R Z .
In order to compute Δ H and S from (7) or from (9), we can start with the standard ideal model to obtain a first approximation for S, using the known channel response matrix H. Then, we iterate on (7) or on (9) to compute the best approximations for Δ H and for S, as explained in Section 3. In [36], it has been proven and demonstrated through simulations that the worst-case scenario is where a rotation correlation matrix Ψ exists such that S J = Ψ S . Thus, our analysis includes the case where S , S J are correlated. Note that S + S F 2 = t r a c e S + S * S + S = t r a c e S + S = r a n k S N t . Therefore:
Y S + S H + Δ H S F = Y S + S H + Δ H S S + S F = Y H + Δ H S S + S F Y H + Δ H S F · S + S F Y H + Δ H S F · N t .
This implies that Y S + S H + Δ H S F ϵ , if Y H + Δ H S F ϵ N t . Thus, continuing with (9) does not lose the generality, as (7) can be solved by the same algorithm, with the error threshold ϵ N t instead of ϵ .
A more simplified case is when S J = S (although it is not simple for the jammer to generate S exactly). Practical examples of intelligent jammers (or neighboring users with the same modulation order), where S J = S or S J = Ψ S , were considered in [17,36,37].
Note that, in view of (2), the part P S I R H J R S J I S + S , which is orthogonal to S + S (in the Frobenius inner-product A , B F = t r B * A ) is simply canceled by multiplication with S + S from the right. However, the part Δ H S = P S I R H J R S J S + S , which is in the direction of S + S , cannot be canceled without intervening in the channel-state by using some feedback. This explains why, in the aforementioned papers, the simplified cases appear as the most challenging interferences. Mathematically, these resemble simple cases or mathematical simplification, but physically, these cases create disturbances in terms of nonlinear distortions in the constellation or duplication of symbols in the constellation, as described in [36].
In the following, we present computational feedback that cancels Δ H by computing Δ H and using it to reliably decode S and update the new MIMO channel-response matrix to be H + Δ H without the need to update the transmitter. The next interference scenario is the PBN case. The PBN case represents the noise energy caused by a jammer, a neighboring user under the same operator, or a user from a neighboring operator that leaks energy across a specific portion of the system’s target bandwidth. The noise power bandwidth of the PBN may be less than that of the user, but the power amplitude of the PBN can be much higher than the user’s received signal. The last scenario is a high-leveled AWGN that is added to the existing noise part, Z, as described in [38].

3. The Alternating Projections HSIC Algorithm

In this section, we write n = N t for the number of transmission antennas and m = N r for the number of receiver antennas for the simplicity of presentation. Let A be any C m × n matrix. Then, we denote the Moore–Penrose pseudoinverse by A + . Let an singular value decomposition (S.V.D.) of A be denoted by A = U Σ V * , where U is an m × m unitary matrix, V is an n × n unitary matrix, and Σ is an m × n rectangular diagonal matrix with non-negative entries, i.e., σ 1 σ 2 σ > 0 , where min m , n are the singular values of A. Then, A + = V Σ + U * , where Σ + is just the diagonal n × m matrix with 1 σ 1 , , 1 σ on its main diagonal. Note that, for A = U Σ V * , as above, we have A = k = 1 σ k u k v k * , where u k , v k , k = 1 , , are the first columns of U , V , respectively. Therefore, A + = k = 1 1 σ k v k u k * .
Remark 1.
Note that A + = lim ϵ 0 + A * ϵ I + A A * 1 . Therefore, if A is a random matrix, and A ˜ = A Almost Surely (A.S.), then A ˜ + always exists and, A ˜ + = A + A.S. In that case, we have: E A ˜ = E A and E A ˜ + = E A + , as well as E A ˜ + = E A + and E A ˜ + + = E A + + . Let L A = I n A + A and R A = I m A A + . Then, A L A = 0 , L A A + = 0 and A + R A = 0 , R A A = 0 , where L A 2 = L A , R A 2 = R A and L A , R A are self-adjoined with simple eigenvalues in the set 0 , 1 . Furthermore, A A + 2 = A A + and A + A 2 = A + A are self-adjoined with simple eigenvalues in the set 0 , 1 .
Let z be a random m × 1 complex vector. Then, we write z CN m × 1 μ , Σ if the p.d.f. of z is exp z μ * Σ 1 z μ det π Σ , where μ = E z is an m × 1 complex vector, and Σ = E z μ z μ * is a positive-definite m × m complex matrix. Let Z be a random m × n complex matrix. Let v e c Z denote the function transforming the matrix Z into a vector by aligning its columns into a single m n × 1 column vector. We write Z CMN m × n M , U , V for Z having the Probability Distribution Function (P.D.F.):
exp t r a c e V 1 Z M * U 1 Z M π m n det U n det V m = exp U 1 / 2 Z M V 1 / 2 F 2 det π V U ,
where M = E Z is a complex m × n matrix, V is a positive-definite complex n × n matrix, and U is a positive-definite complex m × m matrix. One can show that Z CMN m × n M , U , V if and only if v e c Z CN m n × 1 v e c M , V U . Note that, if Z CMN m × n M , U , V , then N + A Z B CMN m × n N + A M B , A U A * , B * V B . Also note that if Z CMN m × n M , U , V , then E Z M Z M * = U t r a c e V , and E Z M * Z M = V t r a c e U . The latter implies that
σ 2 : = E Z M F 2 = E t r a c e Z M * Z M = t r a c e E Z M * Z M = t r a c e U t r a c e V .
Therefore, if Z CMN m × n 0 m × n , σ m I m , σ n I n , then, E Z F 2 = σ 2 . The following lemma can be easily proven.
Lemma 1.
Let A C m × n and B C m × p . The matrix equation A X = B has solutions if and only if A A + B = B (i.e., R A B = 0 ). In that case, the set of all solutions is given by:
X = A + B + L A W ,
where W C n × p is an arbitrary n × p matrix. Moreover, we have X F 2 = A + B F 2 + L A W F 2 , implying that a minimal Frobenius-norm solution is X = A + B . Moreover, even when the condition A A + B = B is not satisfied, X = A + B is still a minimal Frobenius-norm solution to the problem min X C n × p A X B F 2 .
The following theorem would be useful for turning our non-convex problem into a convex one:
Theorem 1.
The set of full-rank matrices is dense in the set of all matrices, i.e., for any A C m × n and any ϵ > 0 , there exists a full-rank matrix A ϵ such that A A ϵ F ϵ .
The proof of this theorem and of the following theorems is given in the Appendix A.
Under the assumptions mentioned above, the standard ideal MIMO model is described by:
Y = H S + Z ,
where S is an n × k OSTBC symbol matrix of signals. We assume that k m n . The m × n matrix H is the channel matrix (random with the unknown p.d.f., but assumed to be stationary) and Z CMN m × k 0 m × k , σ m I m , σ k I k , which is equivalent to v e c Z CN m k × 1 0 m k × 1 , σ 2 m k I k I m .
Theorem 2.
Assume that the communication is made with some modulation not containing 0 and let r 0 be the radius of the modulation point with minimal radius. Assume that k max m , n and let S = S 1 S 2 S S + 1 be the OSTBC symbol matrix of signals, where k = n + q and each S j is n × n , chosen such that S j S j * r 0 2 I n for j = 1 , , , and S + 1 is an arbitrary n × q matrix. In addition, we also assume that S is known to the receiver. Let H 0 = Y S + . Then, H 0 is a random matrix such that:
E H H 0 F 2 = σ 2 k S + F 2 .
Moreover, since S + F is bounded above, by taking k + , it follows that E H H 0 F 2 = 0 , implying that H 0 = H A.S. holds.
In view of Remark 1, H 0 = H A.S. implies that H 0 + = H + A.S., from which we can conclude that E H 0 = E H , and that E H 0 + = E H + . Now, when S is unknown, when we search for S that minimizes Y H S F 2 , by Lemma 1, we need to take S = H + Y . However, as H is random and Y is random, S = H + Y is random, while the true S that was sent by the transmitter is not random. However, as it is almost sure that H 0 = H , we can take S ˜ = E H 0 + Y as an approximation for S. Note that S ˜ is still a random matrix, but it would give us what is needed, as is expressed in the following theorem.
Theorem 3.
Let H 0 be an m × n matrix as in Theorem 2, and further assume that m n and that E H 0 is full-rank. Let S denote an unknown signal matrix that is sent by the transmitter and let Y = H S + Z be the signal measured by the receiver. Let S ˜ = E H 0 + Y = E H 0 + H S + Z (note that S ˜ is a random variable matrix, while S is not random). Then,
E S ˜ = S .
The following theorem connects the expectation of the square error between the approximated computed symbol matrix S ˜ and the real symbol matrix S, in terms of the transmission power, the number of antennas, and the SNR level. This would give us a new formula for the BER, as we will see in the simulations section.
Theorem 4.
Let Y = H S + Z , where H can be the ideal channel matrix or H + Δ H , the resulting channel matrix of the disrupted channel. Assume that the exact H (or the exact H + Δ H , respectively) is known to the receiver and assume that H (or H + Δ H , respectively) is constant for the current session. Let S be the true symbol matrix for the current session, and let S ˜ = H + Y be the approximated symbol matrix. Then, the distribution of S ˜ S (given the constant matrix H or H + Δ H , respectively) is:
S ˜ S CMN n × k 0 n × k , σ m H + H + * , σ k I .
Moreover, the expectation of the square error satisfies:
E S ˜ S F 2 = H F 2 H + F 2 m S N R = P H + F 2 m S N R .
In the following, we propose an algorithm for the computational self-feedback of the receiver that identifies both Δ H and an unknown matrix symbol S. For this purpose, we regard H 0 as H and ignore the measurement noise Z. Therefore, we write Y = H S . Assume that the system has undergone a jamming attack, and the new channel matrix is H + Δ H . Now, the signal received by the receiver is:
Y = H + Δ H S .
In view of Theorem A1, we may assume w.l.o.g. that H + Δ H is full-rank, i.e., has r a n k H + Δ H = n , since we assume that n m . Therefore, H + Δ H + H + Δ H = I n , and (16) implies that
H + Δ H + Y S = 0 .
Let us write (17) as:
S H + Δ H + I k Y = 0 .
Then, in view of Lemma 1, the general solution to the last equation is given by:
S H + Δ H + = W 1 W 2 I m + k I k Y I k Y + ,
where W 1 , W 2 are arbitrary matrices with sizes n × k and n × m , respectively. Since
I k Y + = I k + Y * Y 1 I k Y * ,
it follows that:
S = W 1 I k I k + Y * Y 1 + W 2 Y I k + Y * Y 1 H + Δ H + = W 1 I k + Y * Y 1 Y * + W 2 I m Y I k + Y * Y 1 Y * ,
which is equivalent to:
S = W 1 Y * I m + Y Y * 1 Y + W 2 I m + Y Y * 1 Y = W 1 Y * + W 2 I m + Y Y * 1 Y H + Δ H + = W 1 Y * I m + Y Y * 1 + W 2 I m + Y Y * 1 = W 1 Y * + W 2 I m + Y Y * 1 ,
which is more efficient from the complexity point of view since we assume that m k . Note that the set (21) is actually a subspace, that is the left kernel of I k Y T T that we denote as K e r I k Y T T and is, therefore, closed and convex. Note that W 1 = 0 and W 2 = H + I m + Y Y * leads to Δ H = 0 and S = H + Y , that is the best approximation for the true S in terms of Lemma 1 and Theorem A3 when there is no interference.
Now, as (21) might yield an infeasible point related to the symbol coding that is being used (here, we use QPSK, 8-PSK, and 16-PSK), letting Q P S K = ± 1 ± i C , we define a projection P Q P S K : C n × k Q P S K n × k by (22) below with = 2 , which actually projects any entry of the matrix S onto the closest point in the Q P S K constellation (breaking ties arbitrarily). In the following experiments, we used Algorithm 1, also with 8-PSK and 16-PSK codings, for performance comparison with the QPSK coding. For this purpose, we defined the following general projections for 2 -PSK (for any 2 , including 2 2 -PSK=QPSK):
P 2 P S K S p , q = cos ϕ + i sin ϕ ϕ = 2 π κ 2 , κ = 2 θ 2 π + 1 2 θ = arctan S p , q , S p , q
In order to use the following Algorithm 1, we need to encapsulate Q P S K n × k in a relatively small closed convex set, for which projections can be conveniently calculated. Since any point in Q P S K has an absolute value 2 , we define by B 0 , 2 n k the matrix-ball of all n × k matrices S with S F 2 n k . Now, if S Q P S K n × k , then S i , j = 2 implying that S F 2 = i = 1 n j = 1 k S i , j 2 = 2 n k , from which we conclude that S B 0 , 2 n k and moreover, that each such matrix is on the boundary of the matrix-ball.
Algorithm 1: AP-HSIC: Receiver Self-Feedback Algorithm
Require: An algorithm for computing Moore–Penrose Pseudoinverses and algorithms for computing P C 0 , P C 1 and P Q P S K .
 Input:  H , Y , ϵ > 0 .
 Output:  Δ H and S such that H + Δ H + Y = S , where S Q P S K n × k .
1.
Δ H 0 0
2:
S 0 H + Y
3:
H + Δ H 1 + , S 1 P C 1 H + Δ H 0 + , S 0
4:
H + Δ H 1 + , S 1 P C 0 H + Δ H 1 + , S 1
5:
Δ H 1 H + Δ H 1 + + H
6:
t 1
7:
while  Δ H t Δ H t 1 F 2 + S t S t 1 F 2 > ϵ do
8:
   H + Δ H t + 1 + , S t + 1 P C 1 H + Δ H t + , S t
9:
   H + Δ H t + 1 + , S t + 1 P C 0 H + Δ H t + 1 + , S t + 1
10:
   Δ H t + 1 H + Δ H t + 1 + + H
11:
   t t + 1
12:
end while
13:
Δ H Δ H t
14:
S P Q P S K S t
15:
return  t , Δ H , S
Let
C 0 = H + Δ H + , S Δ H arbitrary and S B 0 , 2 n k ,
and
C 1 = H + Δ H + , S Δ H and S are given by ( 21 ) ,
and note that these sets are closed and convex sets in C n × m × C n × k .
We now need projections on C 0 and on C 1 such that any given point in C n × m × C n × k which is out of the set is projected to the closest point in the boundary of the set. Let P C 0 be defined by A , B A , β B , where:
β = 1 if B F 2 n k 2 n k B F otherwise
The projection P C 0 is realized in Algorithm 2.
For a given couple A , B as above, let f W 1 , W 2 = W 1 Y * + W 2 I m + Y Y * 1 A F 2 and let g W 1 , W 2 = W 1 Y * + W 2 I m + Y Y * 1 Y B F 2 .
Let U = U 1 , U 2 C n × m × C n × k be a directional matrix, which is with U F = U 1 F 2 + U 2 F 2 = 1 and let h > 0 . Then, the directional derivative at W 1 , W 2 in the direction U is defined by:
U f W 1 , W 2 = f U W 1 , W 2 = lim h 0 + f W 1 + h U 1 , W 2 + h U 2 f W 1 , W 2 h .
We compute:
f W 1 + h U 1 , W 2 + h U 2 f W 1 , W 2 = W 1 + h U 1 Y * + W 2 + h U 2 I m + Y Y * 1 A F 2 W 1 Y * + W 2 I m + Y Y * 1 A F 2 = h U 1 Y * + U 2 I m + Y Y * 1 + W 1 Y * + W 2 I m + Y Y * 1 A F 2 W 1 Y * + W 2 I m + Y Y * 1 A F 2 = h 2 U 1 Y * + U 2 I m + Y Y * 1 F 2 + 2 h W 1 Y * + W 2 I m + Y Y * 1 A , U 1 Y * + U 2 I m + Y Y * 1 F ,
from which we conclude that:
U f W 1 , W 2 = 2 W 1 Y * + W 2 I m + Y Y * 1 A , U 1 Y * + U 2 I m + Y Y * 1 F = 2 t r a c e I m + Y Y * 1 Y U 1 * + U 2 * W 1 Y * + W 2 I m + Y Y * 1 A = 2 t r a c e Y U 1 * + U 2 * W 1 Y * + W 2 I m + Y Y * 1 A I m + Y Y * 1 .
Now, a necessary condition for W 1 , W 2 to be a minimum point for f is that U f W 1 , W 2 = 0 for any U = U 1 , U 2 as above. This implies that
W 1 Y * + W 2 I m + Y Y * 1 A I m + Y Y * 1 = 0 ,
which is equivalent to
W 1 Y * + W 2 A I m + Y Y * = 0 .
Similarly, for g, we have:
U g W 1 , W 2 = g U W 1 , W 2 = lim h 0 + g W 1 + h U 1 , W 2 + h U 2 g W 1 , W 2 h .
We compute:
g W 1 + h U 1 , W 2 + h U 2 g W 1 , W 2 = W 1 + h U 1 Y * + W 2 + h U 2 I m + Y Y * 1 Y B F 2 W 1 Y * + W 2 I m + Y Y * 1 Y B F 2 = h U 1 Y * + U 2 I m + Y Y * 1 Y + W 1 Y * + W 2 I m + Y Y * 1 Y B F 2 W 1 Y * + W 2 I m + Y Y * 1 Y B F 2 = h 2 U 1 Y * + U 2 I m + Y Y * 1 Y F 2 + 2 h W 1 Y * + W 2 I m + Y Y * 1 Y B , U 1 Y * + U 2 I m + Y Y * 1 Y F ,
from which we conclude that:
U g W 1 , W 2 = 2 W 1 Y * + W 2 I m + Y Y * 1 Y B , U 1 Y * + U 2 I m + Y Y * 1 Y F = 2 t r a c e Y * I m + Y Y * 1 Y U 1 * + U 2 * W 1 Y * + W 2 I m + Y Y * 1 Y B = 2 t r a c e Y U 1 * + U 2 * W 1 Y * + W 2 I m + Y Y * 1 Y B Y * I m + Y Y * 1 .
A necessary condition for W 1 , W 2 to be a minimum point for g is that U g W 1 , W 2 = 0 for any U = U 1 , U 2 as above. This implies that
W 1 Y * + W 2 I m + Y Y * 1 Y B Y * I m + Y Y * 1 = 0 ,
is equivalent to
W 1 Y * + W 2 I m + Y Y * 1 Y B Y * = 0 W 1 Y * + W 2 Y Y * I m + Y Y * 1 B Y * = 0 W 1 Y * + W 2 Y Y * B Y * I m + Y Y * = 0 .
Gathering (28) and (32), we obtain:
W 2 W 1 I m Y Y * Y * Y * Y Y * = A I m + Y Y * B Y * I m + Y Y * ,
which, in view of Lemma 1, implies that the best approximation in terms of the Frobenius norm is:
W 2 W 1 = A I m + Y Y * B Y * I m + Y Y * I m Y Y * Y * Y * Y Y * + .
Finally, we define the projection P C 1 by A , B A ^ , B ^ , where:
A ^ = W 1 Y * + W 2 I m + Y Y * 1 B ^ = W 1 Y * + W 2 I m + Y Y * 1 Y ,
where W 1 , W 2 are given by (34). The projection P C 1 is realized in Algorithm 3.
Algorithm 1, as presented below, which we call the Alternating Projections Hard Successive Interference Cancellation (AP-HSIC), solves the problem of finding Δ H and S, such that H + Δ H + Y = S , where S B 0 , 2 n k , after which it uses P Q P S K (or the related modulation projection) in order to project S into Q P S K n × k as the final decision. In its main loop, it computes H + Δ H t + 1 + , S t + 1 by applying P C 1 to H + Δ H t + , S t and next, by applying P C 0 to the result, thus alternating between C 1 and C 0 until convergence to an intersection point (i.e., in C 1 C 0 ) is verified.
We can start from any couple; however, a good choice is needed in order to obtain faster convergence, which we took as Δ H 0 = 0 , S 0 = H + Y with the last H known to the receiver, before the jamming attack began, which is a good starting point, as revealed by Theorem A3.
Remark 2.
Note that Y = H + Δ H S with the true S implies that
H + Δ H H + Δ H + Y = H + Δ H H + Δ H + H + Δ H S = H + Δ H S = Y .
Let S ˜ = H + Δ H + Y be computed by Algorithm 1. Then,
H + Δ H S ˜ = H + Δ H H + Δ H + Y = Y .
Therefore, by solving H + Δ H + Y = S instead of Y = H + Δ H S , we do not lose the generality.
Algorithm 2:For P C 0
Require: Matrix and Arithmetic Operations
 Input:  A , B such that A is n × m and B is n × k .
 Output:  A ^ , B ^ C 0 closest to A , B .
1:
if  B F > 2 n k then
2:
      β 2 n k B F
3:
else
4:
      β 1
5:
end if
6:
A ^ , B ^ A , β B
7.
return  A ^ , B ^
Algorithm 3:For P C 1
Require: An algorithm for computing Moore–Penrose Pseudoinverses
 Input:  A , B such that A is n × m and B is n × k and Y.
 Output:  A ^ , B ^ C 1 closest to A , B .
1:
W 2 W 1 A I m + Y Y * B Y * I m + Y Y * I m Y Y * Y * Y * Y Y * +
2:
A ^ W 1 Y * + W 2 I m + Y Y * 1
3:
B ^ W 1 Y * + W 2 I m + Y Y * 1 Y
4:
return  A ^ , B ^

Algorithm Correctness, Convergence, and Complexity

The general problem that we need to solve here is the problem Y = H + Δ H S , for the unknowns Δ H and S, where S Q P S K n × k . We assume that H C m × n is known to the receiver; however, this is not a mandatory assumption since we can rename H + Δ H as an (unknown) H and solve the problem indifferently. The aforementioned general problem is non-convex since it involves the multiplication Δ H · S of two unknown variables Δ H and S, and Q P S K n × k is a discrete set (with 4 n k elements) which is obviously non-convex. Indeed, the decision problem: “Given H , Δ H , Y , does there exist S Q P S K n × k such that Y = H + Δ H S ?” is NP-hard to solve, as one can prove the existence of a polynomial-time reduction from the SUBSET-SUM problem. Therefore, solving the problem Y = H + Δ H S where Δ H is also unknown, is harder, and under the widespread belief that NP≠P, it is not expected to have an efficient (i.e., polynomial-time) exact algorithm. Therefore, the proposed algorithm is an efficient algorithm as an approximation algorithm.
In the previous section, we have shown that we may assume that H + Δ H is full-rank, thus leading to the relaxed problem: H + Δ H + Y = S , where S Q P S K n × k . The constraint S Q P S K n × k was replaced by a closed convex approximation envelope S B 0 , 2 n k and the parametrization in terms of W 1 , W 2 of all the solutions for H + Δ H + Y = S was given. Next, the closed convex sets C 0 and C 1 were defined, and their related projections (of an outer point to its closest point in the related set) P C 0 and P C 1 were defined. We, therefore, need an intersection point, i.e., a point in C 0 C 1 .
For this purpose, we use the Alternating Projections (AP) algorithm, which is a known efficient algorithm that finds a point of intersection of a collection of closed convex sets, and was proven to have a linear rate of convergence globally (see [39,40]) and linear rate of convergence locally for non-convex sets (see [41]). Let ϵ 0 = E S 0 S * F 2 + Δ H 0 Δ H * F 2 denote the initial error, where H + Δ H 0 + , S 0 is the initial point in the search space and H + Δ H * + , S * is a solution to the problem Y = H + Δ H S where S * Q P S K n × k , which, in view of Remark 2, is a point of the intersection C 0 C 1 . We may therefore take H + Δ H * + , S * to be the point of intersection C 0 C 1 with S * Q P S K n × k that is the closest to the initial point. Therefore, the algorithm converges to a point H + Δ H + , S of intersection C 0 C 1 , where S B 0 , 2 n k is the closest to S * Q P S K n × k .
Let ϵ t = E S t S * F 2 + Δ H t Δ H * F 2 denote the error after iteration t was executed. Then, the linearity of convergence means that lim t + ϵ t ϵ t 1 = α for some 0 < α < 1 . It follows that there exists c > 0 such that ϵ t c ϵ 0 α t , for any t. Therefore, for a given error threshold ϵ > 0 , c ϵ 0 α t ϵ implies that the needed number of iterations to achieve the goal is t = 1 ln α ln ϵ ϵ 0 ln c , that is t f = O ln ϵ ϵ 0 , where t f is the final number of iterations. The complexity of a single iteration is O max ( m , n , k ) 3 due to matrix multiplications, matrix inversions, and pseudo-inversions. We conclude that the overall complexity of the proposed AP-HSIC algorithm is: O max ( m , n , k ) 3 ln ϵ ϵ 0 .
Since the only constraint on Δ H is that it should satisfy H + Δ H + Y = S , and Δ H t satisfy this constraint for any t, we may assume that Δ H t f = Δ H * , where t f is the final iteration. Therefore, ϵ t f = E S t f S * F 2 , and using Theorem A4, we conclude that:
ϵ t f n m S N R .
Or, in other words, if the given error threshold is ϵ , then n m S N R ϵ will achieve the goal ϵ t f ϵ . In this case, the needed SNR is:
S N R n 2 m ϵ 2 .
Note that the monotone convergence of the AP algorithm implies that S t is between S t 1 and S * , and Δ H t is between Δ H t 1 and Δ H * . It follows that S t S t 1 F S t 1 S * F and Δ H t Δ H t 1 F Δ H t 1 Δ H * F , from which we conclude that:
E S t S t 1 F 2 + Δ H t Δ H t 1 F 2 E S t 1 S * F 2 + Δ H t 1 Δ H * F 2 = ϵ t 1 2 .
Therefore, if ϵ t 1 2 ϵ 2 , then ϵ t 2 ϵ 2 and we can break the whole loop (Algorithm 1 line 7) since the AP algorithm has converged. On the other hand, if E S t S t 1 F 2 + Δ H t Δ H t 1 F 2 > ϵ 2 , then ϵ t 1 2 > ϵ 2 means that the AP algorithm has not converged yet. This explains the condition in Algorithm 1 line 7.
Since we may assume that m , n , k are bounded, therefore the size of the matrices, and specifically max ( m , n , k ) 3 , enter the complexity of the proposed AP-HSIC algorithm as a constant multiplicative factor. Thus, in this case, the complexity would be dominated by the relation between ϵ and ϵ 0 , which causes the algorithm to undergo several iterations that are shown in the following simulations to be decreasing as a function of the SNR at a rate that is proportional to n m S N R , thus assessing Theorem A4 and specifically (A6). In the simulations, we have fixed the error threshold to be ϵ = 10 9 , where each simulation period was fixed to 200 · T s = 3.2 msec and where the symbol-time was fixed to T s = 16 μ sec , which are custom values for the problem. In each simulation, the algorithm is shown to have no more than eight iterations (in the range 5 S N R 25 dB ), where the convergence was achieved within the simulation period for all simulations.
If, in other scenarios or under different assumptions, the algorithm does not converge within the expected time period, it only means that more computational power is needed at the receiver side because, as noted earlier, the algorithm always converges (in a linear rate of convergence). Finally, note that the algorithm can work with other modulation orders, e.g., 16,32-QAM, since it only needs the definition of a relatively small closed convex set that contains all the possible symbol matrices (i.e., the modulation set) and a projection onto the modulation set that projects a general point onto the closest point in the modulation set.

4. Simulations and Numerical Results

To prove the superiority of the proposed AP-HSIC method, we present (not only on the MATLAB platform but also on the SIMULINK platform) simulations of a communication environment under all of the assumptions discussed in Section 2. Our experiments are based on developing two different simulations, based on the two architectures described in Section 2, and operating under the same conditions and in the same challenging scenarios. We compared the performance of these two simulations in graphical and numerical aspects. Each simulation presents a specific design consisting of several stages in which different disturbance scenarios are run.
To simplify the architectures, the MGSTC transmitter encoder, common to both architectures, includes three OSTBC components (in the transmitter and in the general interference). Each component is equipped with two transmission antennas, meaning that the transmitter and the interference each have six transmission antennas ( N t = 6 ). On the receiver side, we receive the signal Y through six receiving antennas ( N r = 6 ). In addition to the estimated MIMO channel matrix, the received signal is streamed to the MGSTC decoding algorithm in the first architecture and into the AP-HSIC algorithm in the second architecture. The output of the algorithms comprises three Maximal-Ratio-Combiners (MRC) in each receiver and in both architectures for the final decoding, as can be seen in Figure 1.
The first simulation included an MGSTC transmitter based on an information generator block, symbol modulation block, and OSTBC-encoder blocks. The blocking scheme was described in Figure 1 and uses the SIMULINK blocks described in Figure 2. The MIMO channel is a quasi-static Flat-Rayleigh-Fading, which can change the AWGN intensity parameter (variation). The receiver blocks include an MGSTC decoding algorithm and MRC blocks. In addition, the scheme includes an interference simulation block combining two kinds of interference—PBN and general interference (same as the transmitter scheme we described)—each with a MIMO quasi-static Flat-Rayleigh-Fading. Finally, we included a BER calculator to measure the practical effect derived from the system’s performance.
The second simulation was based on the same MGSTC transmitter and MIMO channel matrix block with the same interference block. However, on the receiver side, instead of an MGSTC decoding algorithm block, we changed the receiver front and strengthened the receiver ability with our proposed AP-HSIC block, which operates in a parallel decoding communication mode. The SIMULINK blocks of the second simulation are described in Figure 3.
We examined the architectures of the systems in terms of BER vs. SNR/SIR, by running three interference scenarios separately—high-level AWGN, PBN, and general interference—under three modulation orders—4-, 8-, and 16-PSK—at the transmitter (and at the general interference transmitter).
The simulation performance parameters are based on [42]. As is well known, the systematic BER of the MGSTC decoding algorithm is always the BER of the last iteration. The systematic BER of the MGSTC decoding algorithm was compared with the average total BER of the AP-HSIC, as illustrated in the following Figures.

4.1. MGSTC and AP-HSIC Simulations under High-Level AWGN

As described previously in this section, in the first scenario, we simulated the case of high-level AWGN based on QPSK, 8–PSK, and 16–PSK modulations. In Figure 4a, we illustrate the performance graph based on the QPSK modulation of BER vs. SNR. It should be noted that the performance of the AP-HSIC (purple line) was significantly superior compared to that of the MGSTC decoding algorithm (yellow line, which relates to its systematic performance). The superiority of the AP-HSIC performance has also been proven when compared to the two iterations of the MGSTC decoding algorithm (equivalent to a 2 × 2 MIMO channel—the blue line; and equivalent to a 2 × 4 MIMO channel—the orange line) under the interference mentioned above. Note that the transmission power in the 2 × 2 and in the 2 × 4 MGSTC decoding algorithm was higher than that in the 6 × 6 AP-HSIC scheme for the fairness of comparison considerations.
The graphical analysis of BER vs. SNR consists of three main characteristics that quantify the quality of the system’s performance. The first is the ability of the specific system to achieve the lowest BER at a low SNR. The following illustrations show that the AP-HSIC achieved the lowest BER in the low SNR range in all the test cases. The second is the difference in the transmission power level, which must be invested to converge to a certain BER threshold. For example, comparing the simulation of the MGSTC decoding algorithm to the AP-HSIC under high-leveled AWGN (Figure 4a) at B E R = 10 6 shows that the AP-HSIC achieved an advantage of ∼8 dB in terms of SNR. The third—and the most significant—difference is the level of diversity gain between the systems. It can be seen from Figure 4a that the AP-HSIC achieved a much higher diversity gain. In the following section, we mathematically prove this issue.
Another aspect relates to the cumulative BER in the serial MIMO-mode decoding process based on the MGSTC decoding algorithm. As we described in Section 2, the re-evaluation accuracy of a current iteration totally depends on the previous iteration. From all of the BER vs. SNR graphs, it can be seen that the BER threshold obtained in the first iteration of the MGSTC decoding algorithm (blue line) was accumulated and dragged. This caused a more significant BER threshold in the second iteration (orange line), which became the worst in the third iteration (yellow line), causing a destructive chain reaction leading to the deterioration of the modulation order and increasing the transmission power (which was not even effective in the 8-PSK-black dashed line or 16-PSK-green dashed line cases, as can be seen from Figure 5b). In contrast, due to the parallel decoding process that the AP-HSIC is based on, the BER of the AP-HSIC in all the decoding processes remained consistent and robust. In Figure 4b, we can see other experimental results under the same conditions as those depicted in Figure 4a, but with a different modulation order (8-PSK) at the MGSTC transmitter. The insights from the results of these simulations prove that the AP-HSIC had a better performance when compared to all three MGSTC iterations.
Moreover, we can see that, in noisy environments, the reduction in the MGSTC transmission power in the spatial paths of the third sub-system is reflected in Figure 4b, which is the systematic graph of the BER of the whole MGSTC system. Note that the system has a reciprocal relationship between the diversity gain and the transmission power per symbol for every antenna in the transmitter ( E S 4 ). This weakness is reflected in the fact that, under the simulation with 8-PSK, the graph (Figure 4b) does not converge to any value that can be considered as a threshold value for producing any reliable information.
Figure 5a presents the simulation results with the 16-PSK modulation order under high-leveled AWGN. In this situation, the performance graph of the MGSTC decoding algorithm was even worse than in the previous scenarios. In addition to the graph of the third iteration (yellow dashed line), the graph of the second iteration (orange line) also did not converge towards a BER production threshold value. Thus, in this situation, only the first iteration of the MGSTC decoding algorithm (blue line) produced effective links (i.e., effectively, the system became a 2 × 2 MIMO); while in the AP-HSIC (purple line), the full potential of the MIMO-parallel communication-mode ( 6 × 6 MIMO) is reflected. The illustrations summarizing all the BER vs. SNR graphs of the MGSTC decoding and the AP-HSIC on QPSK, 8-PSK, and 16-PSK modulations in the presence of high-leveled AWGN are presented in Figure 5b. This figure shows that the systems reinforced with the AP-HSIC are the only systems to converge to low values of BER at a given rate of information and a given SNR, under the above modulation orders, in this challenging scenario. In Figure 6a, under the QPSK case, we show the number of internal iterations required by the AP-HSIC to converge. We can also see how the rate of convergence depends on the SNR.

4.2. MGSTC Algorithm and AP-HSIC under PBN Simulation

As was presented at the beginning of this section, the PBN interference is characterized by a noise energy concentration located in the bandwidth part of the received signal. In our simulations, the ratio between the interference bandwidth and the received signal bandwidth was 0.5 . In Figure 7a, we present a performance comparison of the two considered architectures under PBN interference and QPSK modulation order at the transmitter. Note that the performance of the AP-HSIC indicated that for SNR below ≈4 dB, it achieved B E R = 10 6 , while the MGSTC decoding algorithm obtained the same BER with SNR below ≈14 dB, demonstrating the efficacy of ≈10 dB in favor of the AP-HSIC.

4.3. MGSTC Algorithm and AP-HSIC under General Interference Scenarios

The most destructive of the three scenarios is the general interference one. From Figure 7b, we can draw several important conclusions. The first is based on analyzing the system performance graph in its negative and lower-positive regions of SIR. This analysis leads to the conclusion that, in the case of the AP-HSIC, there was a decrease in the BER, depending on the SIR, compared to the MGSTC decoding algorithm, while the graph of the MGSTC decoding algorithm remained almost constant until a relatively high SIR. Another insight is the system’s ability to overcome an interference while maintaining maximum energy efficiency. Thus, from Figure 7b, we can see that with the reinforcement of the AP-HSIC-self-computational feedback—compared to methods based on spatial selectivities, such as the MGSTC decoding algorithm—it is possible to save up to SIR 17 dB at B E R = 10 6 .

5. Discussion, Conclusions, and Future Directions

It is undisputed that resolving interfering offset must be based on spatial selectivity, accuracy in the channel estimation process, and channel sharing with creating feedback between the receiver and the transmitter (and vice versa). However, to produce high-interference cancellation capabilities and enable cognitive and collaborative radio communications, the completion of an intelligent and efficient algorithm reinforcing the receiver is required. Such computational feedback can handle a variety of interference scenarios, as reflected in the simulation results, and improve the decoding process and receiver capabilities. The creation of advanced self-computational feedback capabilities on the receiver is critical for developing the expected MIMO modern wireless communications and advancing the development of MIMO techniques. These technologies require the existence of Ultra-Reliable Low-Latency Communication Coding (URLLC) [43], some of which must be able to respond immediately, such as robots, autonomous tools, vehicles, and medical equipment. Moreover, some technologies physically do not allow feedback between the receiver and the transmitter (e.g., satellite communications), so self-computational feedback is critical when applying these technologies.
The simulation results presented herein demonstrated the required trade-off between energy efficiency and computational capabilities. The results obtained showed that, in cases where there is the requirement to increase the volume of information and transmit at a higher data rate (i.e., in situations where a higher modulation order is required), in addition to the system being under different interference scenarios or jamming attacks, investing in transmission power only does not necessarily lower the BER. Equally important, another insight in analyzing these results was found in the analysis of negative or relatively low-positive SIR regions, where the AP-HSIC significantly lowered the BER compared to the MGSTC technique.
In future research, we plan to expand the concept of computational feedback, deal with the assumptions of selective channels in frequency and time–space, and deal with non-stationary channels in the broadest sense.

Author Contributions

Methodology, Investigation, A.E.; Supervision, Investigation Y.P. (Yossi Peretz), and Y.P. (Yosef Pinhasi); Conceptualization, Methodology, Formal analysis, Software Y.P. (Yossi Peretz). All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Theorems Proofs

Theorem A1.
The set of full-rank matrices is dense in the set of all matrices, i.e., for any A C m × n and any ϵ > 0 , there exists a full-rank matrix A ϵ such that A A ϵ F ϵ .
Proof. 
Assume w.l.o.g. that n m and that = r a n k A n . If = n , there is nothing to prove. Otherwise, let an S.V.D. of A be given by A = U Σ V * , where U is an m × m unitary matrix, V is an n × n unitary matrix, and Σ is an m × n rectangular diagonal matrix with entries σ 1 σ 2 σ > 0 . Let σ k = ϵ n for k = + 1 , , n , let Σ ϵ be the m × n rectangular diagonal matrix with main-diagonal entries σ 1 , , σ n in this order. Finally, let A ϵ = U Σ ϵ V * . Then, r a n k A ϵ = n and
A A ϵ F 2 = U Σ Σ ϵ V * F 2 = Σ Σ ϵ F 2 = k = + 1 n σ k 2 = ϵ 2 .
This completes the proof. □
Theorem A2.
Assume that the communication is made with some modulation not containing 0 and let r 0 be the radius of the modulation point with minimal radius. Assume that k max m , n and let S = S 1 S 2 S S + 1 be an OSTBC symbol matrix of signals, where k = n + q , each S j is n × n , chosen such that S j S j * r 0 2 I n for j = 1 , , , and S + 1 is an arbitrary n × q matrix. In addition, also assume that S is known to the receiver. Let H 0 = Y S + . Then, H 0 is a random matrix such that:
E H H 0 F 2 = σ 2 k S + F 2 .
Moreover, since S + F is bounded above, by taking k + , it follows that E H H 0 F 2 = 0 , implying that H 0 = H A.S. holds.
Proof. 
Note that S has r a n k S = n . Therefore S + = S * S S * 1 and R S = I n S S + = 0 . Now, S S * = j = 1 + 1 S j S j * j = 1 S j S j * r 0 2 I n , implying that S S * 1 1 r 0 2 I n . Therefore, S + * S + = S S * 1 S S * S S * 1 = S S * 1 1 r 0 2 I n , from which we conclude that S + F 2 = t r a c e S + * S + n r 0 2 = n 2 k q r 0 2 . Now, we decompose H = H S S + + H R S = Y Z S + + H R S = H 0 Z S + + H R S = H 0 Z S + and obtain H H 0 F 2 = Z S + F 2 . Therefore,
E H H 0 F 2 = E Z S + F 2 = E t r a c e S + * Z * Z S + = t r a c e S + * E Z * Z S + = t r a c e S + * σ k I k t r a c e σ m I m S + = σ 2 k t r a c e S + * S + = σ 2 k t r a c e S + * S + = σ 2 k S + F 2 σ 2 n 2 k k q r 0 2 .
Now, letting k + , we conclude that E H H 0 F 2 = 0 , implying that H 0 = H A.S. Note also that H 0 = H A.S. immediately implies that E H = E H 0 . □
Theorem A3.
Let H 0 be an m × n matrix as in Theorem A2, and further assume that m n and that E H 0 is full-rank. Let S denote an unknown signal matrix sent by the transmitter, and let Y = H S + Z be the signal measured by the receiver. Let S ˜ = E H 0 + Y = E H 0 + H S + Z (note that S ˜ is a random variable matrix, while S is not random). Then,
E S ˜ = S .
Proof. 
Using the proof of Theorem A2, we have E H = E H 0 . Since m n and E H 0 is full-rank, we obtain that E H 0 + E H 0 = I n . Now, we compute:
E S ˜ = E E H 0 + Y = E H 0 + E H S + Z = E H 0 + E H S + E Z = E H 0 + E H S + 0 m × k = E H 0 + E H 0 S = S .
Theorem A4.
Let Y = H S + Z , where H can be the ideal channel matrix or H + Δ H , the resulting channel matrix of the disrupted channel. Assume that the exact H (or the exact H + Δ H , respectively) is known to the receiver and assume that H (or H + Δ H , respectively) is constant for the current session. Let S be the true symbol matrix for the current session, and let S ˜ = H + Y be the approximated symbol matrix. Then, the distribution of S ˜ S (given the constant matrix H or H + Δ H , respectively) is:
S ˜ S CMN n × k 0 n × k , σ m H + H + * , σ k I .
Moreover, the expectation of the square error satisfies:
E S ˜ S F 2 = H F 2 H + F 2 m S N R = P H + F 2 m S N R .
Proof. 
Let us write Y = H S + Z as Y = H I m S Z . This implies that the minimal Frobenius-norm solution for S and Z is given by:
H I m + Y = S Z , that is, S = H * I m + H H * 1 Y , Z = I m + H H * 1 Y . The substitution of Y = I m + H H * Z into S ˜ = H + Y yields S ˜ = H + I m + H H * Z . Now, H + = lim ϵ 0 + H * ϵ I m + H H * 1 . Let S ˜ ϵ = H * ϵ I m + H H * 1 I m + H H * Z . Then,
S ˜ ϵ = H * ϵ I m + H H * 1 I m + H H * Z = H * ϵ I m + H H * 1 ϵ I m + H H * + 1 ϵ I m Z = H * Z + 1 ϵ H * ϵ I m + H H * 1 Z = S + 1 ϵ H * ϵ I m + H H * 1 Z ,
implying that: S ˜ = lim ϵ 0 + S ˜ ϵ = S + H + Z . Assuming that Z CMN n × k 0 n × k , σ m I m , σ k I , we conclude (A3). The latter implies that E S ˜ S F 2 = t r a c e σ m H + H + * t r a c e σ k I k = = σ 2 m H + F 2 .
Let r = r a n k H , and let H = = 1 r σ u v * be an SVD of H. Then, H + = = 1 r 1 σ v u * . We also have H F 2 = = 1 r σ 2 and H + F 2 = = 1 r 1 σ 2 . Finally, as S N R = ρ = H F 2 σ 2 = P σ 2 , we conclude that E S ˜ S F 2 = P H + F 2 m S N R = H F 2 H + F 2 m S N R = = 1 r σ 2 = 1 r 1 σ 2 m S N R , proving (A4).
Note that, in full-capacity mode, i.e., σ 1 = = σ , we have
E S ˜ S F 2 = r 2 m S N R n 2 m S N R ,
where r = r a n k H n , since n m . Furthermore, under the assumption that H is full-rank, we have r = r a n k H = n . In that case,
E S ˜ S F 2 = n 2 m S N R .

Appendix B. Comparison between Theoretical Results and Simulations

Given Theorem A4, and specifically given (A6), let us relate the expected number of defected bits to the expected decoding error E S ˜ S F 2 as:
γ n m S N R ,
where γ is an assumed universal correction factor that depends on the modulation only.
Then,
B E R = γ n m S N R 2 n k = γ 2 k m S N R .
Therefore, for the MGSTC simulated system, where k = 402 symbols, we have:
B E R M G S T C = γ 2 · 402 · 2 · S N R + γ 2 · 402 · 4 · S N R 2 + γ 2 · 402 · 6 · S N R 4 = γ 804 S N R · 2 + 2 / 3 .
For the AP-HSIC, for fairness of comparison, we took its SNR per-antenna to be 2 1 + 1 / 2 + 1 / 4 6 S N R , relative to the MGSTC-decoding algorithm. Therefore, we have:
B E R P A H S I C = γ 2 · 402 · 6 · 7 S N R 12 = γ 804 S N R · 2 7
Taking the ratio, we obtain the following:
B E R P A H S I C B E R M G S T C = 2 7 2 + 2 / 3 0.2396 .
To theoretically establish the simulation results, two approaches are represented, based on Formula (A8). The first approach is as follows. Taking the logarithm of (A8), we obtain:
10 log 10 B E R = 10 log 10 γ + 10 log 10 n 5 log 10 m 5 log 10 S N R S N R 10 log 10 γ 5 log 10 S N R .
From this, we can conclude that
10 log 10 B E R P A H S I C B E R M G S T C S N R 5 log 10 S N R P A H S I C + 5 log 10 S N R M G S T C ,
which, in view of (A7), should give us:
5 log 10 S N R P A H S I C + 5 log 10 S N R M G S T C 10 log 10 0.2396 6.2051   dB .
Indeed, looking at Figure 4a at B E R = 1 · 10 5 , we can see that the difference between the S N R values was approximately 6 dB. The second approach is based on the following stages. First, we measure several different samples, with the AP-HSIC simulator (for the high-leveled AWGN, QPSK modulation order scenario), of E S ˜ S F 2 and the number of incorrect bits per-frame. The sampled values of E S ˜ S F 2 are defined as a vector x, and the number of incorrect bits per-frame as another vector y. In the second stage, we perform the calculation for the assumed universal correction factor γ , as γ = 2 n k i x i y i i x i 2 , to minimize the mean-square-error of the linear approximation for it. In our calculation, we found γ Q P S K = 2.53 · 10 3 . The last stage involves calculating the theoretical i th BER as B E R i = γ Q P S K x i 2 n k . In our simulations, we had E S ˜ S F 2 = 19 under S N R 10.5 dB. Thus, with γ Q P S K = 2.53 · 10 3 , the theoretical BER was 1 · 10 5 , which is identical to the BER value shown in Figure 4a. A comparison between the measured AP-HSIC QPSK BER and the theoretical AP-HSIC QPSK BER is in Figure 4b.
Under the same simulation conditions but with an 8-PSK modulation order, the same theoretical calculation of the BER was carried out. In this case, we found γ 8 P S K = 1.2 , and the theoretical BER under S N R 10.5 dB was 1.04 · 10 4 . In comparison, the BER under the value of S N R 10.5 dB in Figure 4b was ≈ 1 · 10 4 .
For the 16-PSK case, we again carried out the same calculation processes and found γ 16 P S K = 6.1 , while the theoretical BER under S N R 10.5 dB was 8.3 · 10 3 . The BER under the value of S N R 10.5 dB in Figure 5a was ≈ 9 · 10 3 .
Table A1. Units and parameters used in the conducted simulations.
Table A1. Units and parameters used in the conducted simulations.
SymbolParameterValue/Description
c i Number of OSTBC component encoders in the MGSTC transmitter i = 1 , 2 , 3
n i Number of transmission antennas for every OSTBC component n 1 = 2 , n 2 = 2 n 3 = 2
N t Total number of transmission antennas in the MGSTC transmitter6
N r Sum of the total receiver antennas in the receiver6
S c i = s c i , 1 s c i , 2 Row vectors of block transmission symbol matrix s c i , 1 , s c i , 2 i = 1 , 2 , 3
s c i , 1 Transmission Alamouti coding operation in the first antenna of the OSTBC encoder t s 1 2 j 1 = a t + T s s 1 2 j = b * j = 1 , , 201
s c i , 2 Transmission Alamouti coding operation in the second antenna of the OSTBC encoder t s 2 2 j 1 = b t + T s s 2 2 j = a * j = 1 , , 201
T S c i Sample time per frame 16 · 10 6 (s)
R b Transmission bit rate 174.825 · 10 6 (bps)
H T R Channel matrix response between the transmitter and the receiver 6 × 6
Table A2. Units and parameters used in the conducted simulations.
Table A2. Units and parameters used in the conducted simulations.
SymbolParameterValue/Description
H J R Channel matrix response between the general interference/jammer to the receiver 6 × 6
N j Sum of the total transmission antennas in the MGSTC general interference6
S J The OSTBC matrix of the interferer
J c i = j c i , 1 j c i , 2 Row vectors of block transmission of the general interference/jammer j c i , 1 , j c i , 2 i = 1 , 2 , 3
j c i , 1 Transmission Alamouti coding operation in the first antenna of the OSTBC encoder t j 1 2 j 1 = a t + T s j 1 2 j = b * j = 1 , , 201
j c i , 2 Transmission Alamouti coding operation in the second antenna of the OSTBC encoder t j 2 2 j 1 = b t + T s j 2 2 j = a * j = 1 , , 201
Modulation 4 - , 8 - , o r 16 - P S K
S N R Signal-to-Noise Ratio0–25 dB
S I R Signal-to-Interference Ratio 7 –25 dB
E s Energy-to-symbol1 (Watt)
SThe OSTBC matrix of the transmitter

References

  1. Abu-Rgheff, M.A. 5G Physical Layer Technologies; John Wiley & Sons: Hoboken, NJ, USA, 2019. [Google Scholar]
  2. Dahlman, E.; Parkvall, S.; Skold, J. 5G NR: The Next Generation Wireless Access Technology; Academic Press: Cambridge, MA, USA, 2020. [Google Scholar]
  3. Mistry, Z.; Kumar Yadav, A.; Kothari, M. A Review on 6th Generation Wireless Communication Networks Based on Artificial Intelligence. In Innovations in Cyber Physical Systems; Springer: Berlin/Heidelberg, Germany, 2021; pp. 275–286. [Google Scholar]
  4. Koc, A.; Le-Ngoc, T. Intelligent Non-Orthogonal Beamforming with Large Self-Interference Cancellation Capability for Full-Duplex Multi-User Massive MIMO Systems. IEEE Access 2022, 10, 51771–51791. [Google Scholar] [CrossRef]
  5. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-aided hybrid satellite-terrestrial relay networks: Joint beamforming design and optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  6. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based secure energy efficient beamforming in multibeam satellite systems. IEEE Trans. Aerosp. Electron. Syst. 2022. early access. [Google Scholar] [CrossRef]
  7. Kang, J.M.; Kim, I.M.; Chun, C.J. Deep learning-based MIMO-NOMA with imperfect SIC decoding. IEEE Syst. J. 2019, 14, 3414–3417. [Google Scholar] [CrossRef]
  8. Shlezinger, N.; Fu, R.; Eldar, Y.C. DeepSIC: Deep soft interference cancellation for multiuser MIMO detection. IEEE Trans. Wirel. Commun. 2020, 20, 1349–1362. [Google Scholar] [CrossRef]
  9. Niu, H.; Lin, Z.; Chu, Z.; Zhu, Z.; Xiao, P.; Nguyen, H.X.; Lee, I.; Al-Dhahir, N. Joint beamforming design for secure RIS-assisted IoT networks. IEEE Internet Things J. 2022, 10, 1628–1641. [Google Scholar] [CrossRef]
  10. Marin, J.; Turunen, M.; Bernhardt, M.; Riihonen, T. Self-interference cancelation performance in full-duplex jamming and spectrum monitoring. In Proceedings of the 2021 International Conference on Military Communication and Information Systems (ICMCIS), The Hague, The Netherlands, 4–5 May 2021; pp. 1–8. [Google Scholar]
  11. Dong, K.; Zhang, Z.; Xu, X. A hybrid interference suppression scheme for global navigation satellite systems. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017; pp. 1–7. [Google Scholar]
  12. Morocho-Cayamcela, M.E.; Lee, H.; Lim, W. Machine learning for 5G/B5G mobile and wireless communications: Potential, limitations, and future directions. IEEE Access 2019, 7, 137184–137206. [Google Scholar] [CrossRef]
  13. Luo, F.L. Machine Learning for Future Wireless Communications; John Wiley & Sons: Hoboken, NJ, USA, 2020. [Google Scholar]
  14. Marzetta, T.L.; Ngo, H.Q. Fundamentals of Massive MIMO; Cambridge University Press: Cambridge, UK, 2016. [Google Scholar]
  15. Almers, P.; Bonek, E.; Burr, A.; Czink, N.; Debbah, M.; Degli-Esposti, V.; Hofstetter, H.; Kyösti, P.; Laurenson, D.; Matz, G.; et al. Survey of channel and radio propagation models for wireless MIMO systems. EURASIP J. Wirel. Commun. Netw. 2007, 2007, 019070. [Google Scholar] [CrossRef]
  16. Pätzold, M.; Hogstad, B.O. Design and performance of MIMO channel simulators derived from the two-ring scattering model. In Proceedings of the 14th IST Mobile & Communications Summit, IST 2005, Dresden, Germany, 19–23 June 2005. [Google Scholar]
  17. Mahal, J.A. Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems. Ph.D. Thesis, Virginia Tech, Blacksburg, VA, USA, 2018. [Google Scholar]
  18. Huo, Y.; Tian, Y.; Ma, L.; Cheng, X.; Jing, T. Jamming strategies for physical layer security. IEEE Wirel. Commun. 2017, 25, 148–153. [Google Scholar] [CrossRef]
  19. Wang, Z.; Ma, M.; Qin, F. Neural-Network-Based Nonlinear Self-Interference Cancelation Scheme for Mobile Stations With Dual-Connectivity. IEEE Access 2021, 9, 53566–53575. [Google Scholar] [CrossRef]
  20. Yuan, L.; Pan, J.; Yang, N.; Ding, Z.; Yuan, J. Successive interference cancellation for LDPC coded nonorthogonal multiple access systems. IEEE Trans. Veh. Technol. 2018, 67, 5460–5464. [Google Scholar]
  21. Lin, Z.; Lin, M.; Wang, J.B.; De Cola, T.; Wang, J. Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multiple access. IEEE J. Sel. Top. Signal Process. 2019, 13, 657–670. [Google Scholar] [CrossRef]
  22. Saito, K.; Benjebbour, A.; Kishiyama, Y.; Okumura, Y.; Nakamura, T. Performance and design of SIC receiver for downlink NOMA with open-loop SU-MIMO. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 1161–1165. [Google Scholar]
  23. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Non-orthogonal multiple access for 5G and beyond. Proc. IEEE 2017, 105, 2347–2381. [Google Scholar] [CrossRef]
  24. Wu, S.H.; Chiu, L.K.; Wang, J.W. Reconfigurable hybrid beamforming for dual-polarized mmWave MIMO channels: Stochastic channel modeling and architectural adaptation methods. IEEE Trans. Commun. 2017, 66, 741–755. [Google Scholar] [CrossRef]
  25. Ahmed, I.; Khammari, H.; Shahid, A.; Musa, A.; Kim, K.S.; De Poorter, E.; Moerman, I. A survey on hybrid beamforming techniques in 5G: Architecture and system model perspectives. IEEE Commun. Surv. Tutorials 2018, 20, 3060–3097. [Google Scholar] [CrossRef]
  26. Piazza, D.; Spagnolini, U. Random beamforming for spatial multiplexing in downlink multiuser MIMO systems. In Proceedings of the 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications, Berlin, Germany, 11–14 September 2005; Volume 4, pp. 2161–2165. [Google Scholar]
  27. Alkhateeb, A.; Leus, G.; Heath, R.W. Multi-layer precoding: A potential solution for full-dimensional massive MIMO systems. IEEE Trans. Wirel. Commun. 2017, 16, 5810–5824. [Google Scholar] [CrossRef]
  28. Van Luong, T.; Shlezinger, N.; Xu, C.; Hoang, T.M.; Eldar, Y.C.; Hanzo, L. Deep learning based successive interference cancellation for the non-orthogonal downlink. IEEE Trans. Veh. Technol. 2022, 71, 11876–11888. [Google Scholar] [CrossRef]
  29. Hampton, J.R. Introduction to MIMO Communications; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
  30. Hamidian, K.; Mohamed, W.Q. Performance Enhancement of MIMO–MGSTC Using a New Detection and Decoding Technique. In Proceedings of the Future of Information and Communication Conference, Singapore, 5–6 April 2018; pp. 12–25. [Google Scholar]
  31. Kang, R.; Zhang, J.; Zhang, Z.; Ge, L. Multi-group independent sub-channels allocation precoding for MGSTC systems in correlated HF-MIMO channels. In Proceedings of the 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 25–26 March 2017; pp. 1799–1804. [Google Scholar]
  32. Davydov, A.; Sergeev, V.; Mondal, B.; Papathanassiou, A.; Sengupta, A. Robust MMSE-IRC for Uplink Massive MIMO aided C Network. In Proceedings of the 2020 IEEE Globecom Workshops (GC Wkshps), Taipei, Taiwan, 7–11 December 2020; pp. 1–5. [Google Scholar]
  33. Onggosanusi, E.; Rahman, M.S.; Guo, L.; Kwak, Y.; Noh, H.; Kim, Y.; Faxer, S.; Harrison, M.; Frenne, M.; Grant, S.; et al. Modular and high-resolution channel state information and beam management for 5G new radio. IEEE Commun. Mag. 2018, 56, 48–55. [Google Scholar] [CrossRef]
  34. Molisch, A.F.; Ratnam, V.V.; Han, S.; Li, Z.; Nguyen, S.L.H.; Li, L.; Haneda, K. Hybrid beamforming for massive MIMO: A survey. IEEE Commun. Mag. 2017, 55, 134–141. [Google Scholar] [CrossRef]
  35. Poisel, R. Modern Communications Jamming Principles and Techniques; Artech House: Norwood, MA, USA, 2011. [Google Scholar]
  36. Elgam, A.; Balal, Y.; Pinhasi, Y. Study of 5G-NR-MIMO Links in the Presence of an Interferer. Electronics 2021, 10, 732. [Google Scholar] [CrossRef]
  37. El Bamby, M.S.; Bennis, M.; Latva-aho, M. UL/DL decoupled user association in dynamic TDD small cell networks. In Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels, Belgium, 25–28 August 2015; pp. 456–460. [Google Scholar]
  38. Frontera-Pons, J.; Pascal, F.; Ovarlez, J.P. Adaptive nonzero-mean Gaussian detection. IEEE Trans. Geosci. Remote Sens. 2016, 55, 1117–1124. [Google Scholar] [CrossRef]
  39. Bauschke, H.H.; Borwein, J.M. On the convergence of von Neumann’s alternating projection algorithm for two sets. Set-Valued Anal. 1993, 1, 185–212. [Google Scholar] [CrossRef]
  40. Bauschke, H.H.; Borwein, J.M. On projection algorithms for solving convex feasibility problems. SIAM Rev. 1996, 38, 367–426. [Google Scholar] [CrossRef]
  41. Lewis, A.S.; Luke, D.R.; Malick, J. Local linear convergence for alternating and averaged nonconvex projections. Found. Comput. Math. 2009, 9, 485–513. [Google Scholar] [CrossRef]
  42. Sandhu, S.; Paulraj, A. Space-time block codes: A capacity perspective. IEEE Commun. Lett. 2000, 4, 384–386. [Google Scholar] [CrossRef]
  43. Anand, A.; De Veciana, G.; Shakkottai, S. Joint scheduling of URLLC and eMBB traffic in 5G wireless networks. IEEE/ACM Trans. Netw. 2020, 28, 477–490. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Scheme blocks of the MGSTC transmitter, general receiver (including MGSTC or AP-HSIC decoding algorithm), and general interference/smart jammer.
Figure 1. Scheme blocks of the MGSTC transmitter, general receiver (including MGSTC or AP-HSIC decoding algorithm), and general interference/smart jammer.
Electronics 12 00761 g001
Figure 2. Scheme blocks of the simulation of the MGSTC algorithm based on the SIMULINK/MATLAB platform.
Figure 2. Scheme blocks of the simulation of the MGSTC algorithm based on the SIMULINK/MATLAB platform.
Electronics 12 00761 g002
Figure 3. Scheme blocks of the simulation of the AP-HSIC based on the SIMULINK/MATLAB platform.
Figure 3. Scheme blocks of the simulation of the AP-HSIC based on the SIMULINK/MATLAB platform.
Electronics 12 00761 g003
Figure 4. BER vs. SNR of MGSTC and AP-HSIC. (a) Comparison under QPSK modulation in the presence of high-level AWGN. (b) Comparison under 8-PSK modulation in the presence of high-level AWGN.
Figure 4. BER vs. SNR of MGSTC and AP-HSIC. (a) Comparison under QPSK modulation in the presence of high-level AWGN. (b) Comparison under 8-PSK modulation in the presence of high-level AWGN.
Electronics 12 00761 g004
Figure 5. BER vs. SNR of MGSTC and AP-HSIC. (a) Comparison under 16-PSK in the presence of high-leveled AWGN. (b) Comparisons using QPSK, 8-PSK,16-PSK, in the presence of high-level AWGN.
Figure 5. BER vs. SNR of MGSTC and AP-HSIC. (a) Comparison under 16-PSK in the presence of high-leveled AWGN. (b) Comparisons using QPSK, 8-PSK,16-PSK, in the presence of high-level AWGN.
Electronics 12 00761 g005
Figure 6. Number of iterations of the AP-HSIC and measured-theoretical AP-HSIC QPSK BER: (a) Number of iterations of the AP-HSIC vs. SNR under QPSK modulation; and (b) Comparisons between the measured-theoretical AP-HSIC QPSK BER.
Figure 6. Number of iterations of the AP-HSIC and measured-theoretical AP-HSIC QPSK BER: (a) Number of iterations of the AP-HSIC vs. SNR under QPSK modulation; and (b) Comparisons between the measured-theoretical AP-HSIC QPSK BER.
Electronics 12 00761 g006
Figure 7. BER vs. SNR of MGSTC and AP-HSIC. (a) Comparison under QPSK modulation in the presence of PBN interference. (b) Comparison under QPSK modulation in the presence of general interference.
Figure 7. BER vs. SNR of MGSTC and AP-HSIC. (a) Comparison under QPSK modulation in the presence of PBN interference. (b) Comparison under QPSK modulation in the presence of general interference.
Electronics 12 00761 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Elgam, A.; Peretz, Y.; Pinhasi, Y. Enhancing MIMO Spatial-Multiplexing and Parallel-Decoding under Interference by Computational Feedback. Electronics 2023, 12, 761. https://doi.org/10.3390/electronics12030761

AMA Style

Elgam A, Peretz Y, Pinhasi Y. Enhancing MIMO Spatial-Multiplexing and Parallel-Decoding under Interference by Computational Feedback. Electronics. 2023; 12(3):761. https://doi.org/10.3390/electronics12030761

Chicago/Turabian Style

Elgam, Avner, Yossi Peretz, and Yosef Pinhasi. 2023. "Enhancing MIMO Spatial-Multiplexing and Parallel-Decoding under Interference by Computational Feedback" Electronics 12, no. 3: 761. https://doi.org/10.3390/electronics12030761

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop