Next Article in Journal
Nonoscillatory Solutions for m-th-Order Nonlinear Neutral Differential Equations with General Delays: Fixed-Point Approach and Application
Previous Article in Journal
Collision Detection Algorithms for Autonomous Loading Operations of LHD-Truck Systems in Unstructured Underground Mining Environments
Previous Article in Special Issue
Low-Complexity Relay Selection for Full-Duplex Random Relay Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Maximum Likelihood Detection in Cooperative DF MIMO Systems with One-Bit ADCs

Department of Electronic Engineering, Gachon University, Seongnam 13120, Republic of Korea
Mathematics 2025, 13(15), 2361; https://doi.org/10.3390/math13152361
Submission received: 30 June 2025 / Revised: 19 July 2025 / Accepted: 22 July 2025 / Published: 23 July 2025
(This article belongs to the Special Issue Computational Methods in Wireless Communication)

Abstract

This paper investigates the error performance of cooperative decode-and-forward (DF) multiple-input multiple-output (MIMO) systems employing one-bit analog-to-digital converters (ADCs) over Rayleigh fading channels. In cooperative DF MIMO systems, detection errors at the relay may propagate to the destination, thereby degrading overall detection performance. Although joint maximum likelihood detection can efficiently mitigate error propagation by leveraging probabilistic information from a source-to-relay link, its computational complexity is impractical. To address this issue, an approximate maximum likelihood (AML) detection scheme is introduced, which significantly reduces complexity while maintaining reliable performance. However, its analysis under one-bit ADCs is challenging because of its nonlinearity. The main contributions of this paper are summarized as follows: (1) a tractable upper bound on the pairwise error probability (PEP) of the AML detector is derived using Jensen’s inequality and the Chernoff bound, (2) the asymptotic behavior of the PEP is analyzed to reveal the achievable diversity gain, (3) the analysis shows that full diversity is attained only when symbol pairs in the PEP satisfy a sign-inverted condition and the relay correctly decodes the source symbol, and (4) the simulation results verify the accuracy of the theoretical analysis and demonstrate the effectiveness of the proposed analysis.

1. Introduction

Wireless communications have become a core component of modern mobile systems, enabling high-speed data transmission and reliable connectivity. Over the past two decades, its advancement has been largely driven by the 3rd Generation Partnership Project, which established global standards ranging from 3G and 4G LTE to the current 5G New Radio [1]. These standards introduced key innovations in wireless communications, including orthogonal frequency-division multiplexing, carrier aggregation, and multi-antenna transmission schemes, all of which aim to improve the spectral efficiency, communication reliability, and user experience. Recently, advanced technologies such as extremely high-frequency communication, cognitive networks, integrated sensing and communication, and reconfigurable intelligent surfaces have been actively examined to satisfy the unprecedented demands of the next-generation wireless standards [2,3,4,5].
Multi-input multi-output (MIMO) systems are a fundamental and effective approach for enhancing wireless communication performance by deploying multiple antennas at the transmitter and/or receiver [6,7,8,9]. Multi-antenna configurations have been widely incorporated into modern wireless standards to exploit these advantages. Massive MIMO, which employs a large number of antennas, has gained significant attention because of its ability to improve both spectral and energy efficiency. However, implementing numerous antennas on the receiver side remains a practical challenge in mobile devices because of limitations in the physical form factor and increased hardware complexity.
Cooperative communication has emerged as an effective solution to overcome this limitation without requiring additional antennas at the user end. Among cooperative strategies, the decode-and-forward (DF) protocol is attractive because of its favorable performance and relatively low implementation complexity [10,11,12]. However, DF systems are inherently susceptible to error propagation when a relay node incorrectly decodes the transmitted signal. Thus far, various detection strategies have been proposed [13,14,15], with joint maximum likelihood (JML) detection being known for achieving full diversity gain to mitigate this effect. However, the computational burden of JML detection at the destination limits its practical applicability in resource-constrained systems.
Alternative approaches such as cooperative maximum ratio combining (MRC) [13] and pseudo-linear combiners [14] have been introduced; however, their applications are often restricted to single-antenna systems or orthogonal space-time block coded schemes. To address these limitations, a pairwise error probability (PEP)-based maximum likelihood (ML) detection method was proposed in [15], offering a good trade-off between performance and complexity. However, these studies assumed the availability of ideal or high-resolution analog-to-digital converters (ADCs), often being impractical for power- and cost-constrained devices.
In this context, low-resolution analog-to-digital converters (ADCs) have emerged as a promising solution for reducing power consumption in future wireless systems characterized by wide bandwidths and large-scale antenna arrays [16,17,18]. Among these, one-bit ADCs provide the most significant power savings by quantizing received signals based only on their sign information. Although this extreme quantization leads to considerable energy efficiency, it introduces substantial nonlinear distortion [19,20]. Research on one-bit ADCs has gained momentum, and their application in cooperative communication systems remains relatively underexplored. Recent studies have started addressing this gap [21,22,23,24,25]. For example, the studies in [21,22] examined the capacity limits of multipair massive MIMO systems under one-bit quantization, while those in [23,24] investigated multi-hop multi-user MIMO systems in which the adverse effects of one-bit ADCs were mitigated through supervised-learning-based techniques. However, such deep-learning approaches impose significant computational demands, which limits their practical deployment in energy- and resource-constrained devices.
More recently, an approximate ML (AML) detection scheme tailored for cooperative DF MIMO systems with one-bit ADCs was introduced [26]; it focuses on alleviating error propagation effects that arise in such configurations. The AML scheme is sufficiently versatile to be extended to one-way and two-way DF relay systems and has been shown to outperform direct communication in terms of error probability. Despite these advances, a rigorous analytical characterization of DF MIMO systems with one-bit ADCs, especially in the presence of fading channels, remains lacking. In the absence of such an analysis, it is difficult to gain theoretical insights into the error performance and achievable diversity gains of the system. Therefore, there is a clear need for analytical tools that can quantify the performance limits of cooperative MIMO systems with one-bit ADCs.
This paper presents a detailed performance analysis that focuses on the PEP of the AML detection over Rayleigh fading channels for addressing the performance limitations of cooperative DF MIMO systems with one-bit ADCs. Obtaining a closed-form expression for the exact PEP is analytically intractable because of the severe nonlinearity induced by one-bit quantization. To overcome this challenge, a tractable upper bound on the PEP is derived by employing Jensen’s inequality and the Chernoff bound. Building on the derived upper bound, the asymptotic behavior of the PEP is further investigated in the high signal-to-noise ratio (SNR) regime. These asymptotic results yield key theoretical insights into the diversity gain achievable in cooperative MIMO systems with one-bit ADCs. A primary finding is that the diversity gain can be enhanced through the DF relay protocol when symbol pairs considered in the PEP analysis form sign-reversed pairs and the relay correctly detects the source symbol. In contrast, the diversity contribution from the source-to-relay link is lost when the relay fails to decode the source symbol correctly and the gain is limited to the source-to-destination link. Extensive Monte Carlo simulations were conducted on Rayleigh fading channels to validate the analytical findings and evaluate their practical relevance. The simulation results closely match the derived upper bounds, demonstrating the accuracy of the analysis. Finally, the proposed analysis provides fundamental insights and design guidelines for cooperative MIMO systems with one-bit ADCs in energy-efficient wireless networks.
The remainder of this paper is organized as follows: Section 2 presents the system model for MIMO communications with one-bit ADCs and introduces the JML detection scheme along with its low-complexity approximation. The AML detection performance is analyzed in Section 3. Section 4 provides simulation results to validate the effectiveness of the proposed method. Finally, Section 5 concludes the paper.

Notation

Notations ( · ) T and ( · ) H represent the transpose and Hermitian (conjugate transpose) of a matrix, respectively. The operators P ( · ) and E ( · ) represent the probability and the expectation of an event, respectively, and Re ( · ) and Im ( · ) refer to the real and imaginary parts of the complex number, respectively. Function log ( · ) represents a natural logarithm. The symbols | · | and · 0 represent the absolute value and zero norm (i.e., the number of nonzero elements), respectively. The indicator function 1 { X } equals to 1 if the event X is true and is 0 otherwise. The sign function Sign ( x ) is defined as 1 for x 1 and 1 otherwise. The Q-function is defined as Q ( x ) = 1 2 π x e u 2 / 2 d u . Finally, R and C represent sets of real and complex numbers, respectively.

2. System Model

A signal model is formulated for point-to-point MIMO systems equipped with one-bit ADCs. Based on this model, a likelihood-based decision rule is developed to optimize the detection error probability under quantized observations. Subsequently, a cooperative DF MIMO system that exploits spatial diversity is introduced. The signal model and detection strategy serve as an analytical basis to extend the performance analysis to cooperative relay scenarios.

2.1. Signal Model

Consider a MIMO communication scenario in which transmitter node a is equipped with N a antennas and the receiver node b possesses N b antennas. The signal transmitted over a Rayleigh fading channel from node a to node b can be modeled as
r ¯ a b = γ a b N a G ¯ a b x ¯ a + n ¯ a b ,
where γ a b represents the average received SNR. The channel matrix G ¯ a b C N b × N a is assumed to follow a Rayleigh fading distribution, where each element is independently drawn from a circularly symmetric complex Gaussian distribution with zero mean and unit variance. The transmitted signal vector x ¯ a C N a × 1 is generated from encoded data symbols drawn from the modulation alphabet A ¯ N a , where A ¯ represents an M-ary quadrature amplitude modulation (QAM) constellation. This signal is normalized such that its average power satisfies 1 N a E { | x ¯ a | 2 } = 1 . The received signal is corrupted using additive white Gaussian noise n ¯ a b C N a b × 1 , which has independent components with zero mean and unit variance.
To enable symbol detection under one-bit quantization, the complex-valued received signal in (1) is reformulated in an equivalent real-valued representation r a b = [ Re { r ¯ a b } , Im { r ¯ a b } ] T as
r a b = γ a b N a G a b x a + n a b = H a b x a + n a b ,
where
G a b = Re { G ¯ a b } Im { G ¯ a b } Im { G ¯ a b } Re { G ¯ a b } , x a = Re { x ¯ a } Im { x ¯ a } n a b = Re { n ¯ a b } Im { n ¯ a b } ,
where the effective channel matrix is defined as H a b γ a b N a G a b R 2 N b × 2 N a . The real-valued input vector x a A 2 N a is drawn from the underlying modulation alphabet A , which corresponds to an M -ary pulse-amplitude modulation constellation. The ADC applied at the receiver imposes a hard-limiting operation, which converts each entry of r a b to its sign. The quantized observation corresponding to the i-th dimension is given by
q a b , i = sign ( r a b . i ) = sign ( h a b , i T x a + n a b , i ) ,
where i I = { 1 , , 2 N b } and h a b , i T represents the i-th row of the matrix H a b .

2.2. ML Detection

The ML detection rule is revisited in the context of one-bit quantized MIMO systems inspired by the formulation in [27]. Let G = { i : q a b , i 0 , i I } and L = { i : q a b , i < 0 , i I } . Given a candidate signal vector x a , the probability of observing a quantized output q a b is computed under the assumption of statistically independent components as follows:
P { q a b | x a } = P { q a b , i 0 | i G } P { q a b , i < 0 | i L } = P { q a b , i h a b , i T x a n a b , i | i G } P { q a b , i h a b , i T x a n a b , i | i L } = ( a ) P { q a b , i h a b , i T x a n a b , i | i G } P { q a b , i h a b , i T x a n a b , i | i L } = ( b ) i = 1 2 N b 1 Q 2 q a b , i h a b , i T x a ,
where step ( a ) holds because n a b , i and n a b , i are identically distributed, and step ( b ) holds because n a b follows Gaussian distribution with zero mean and 1 2 variance.
Then, the likelihood probability can be formulated as follows.
P { q a b | x a } = q a b , i = c a b , i ( x a ) 1 Q 2 q a b , i h a b , i T x a q a b , i c a b , i ( x a ) 1 Q 2 q a b , i h a b , i T x a = ( a ) q a b , i = c a b , i ( x a ) 1 Q 2 q a b , i h a b , i T x a q a b , i c a b , i ( x a ) Q 2 q a b , i h a b , i T x a = q a b , i = c a b , i ( x a ) 1 Q 2 | h a b , i T x a | q a b , i c a b , i ( x a ) Q 2 | h a b , i T x a | = i = 1 2 N b P { q a b , i | c a b , i x a } ,
where c a b , i x a represents the i-th entry of the noiseless decision vector c a b x a sign ( H a b x a ) in ( a ) . This vector captures the quantized version of the channel output in the absence of noise. The conditional probability P { q a b , i | c a b , i x a } of an individual quantized symbol q a b , i depends on whether it matches the ideal decision bit c a b , i , and it is given by
P { q a b , i | c a b , i x a } = p a b , i x a , q a b , i c a b , i x a 1 p a b , i x a , q a b , i = c a b , i x a ,
where the error probability p a b , i x a associated with the i-th bit is characterized using the Q-function Q 2 | h a b , i T x a | .
Taking the logarithm of the likelihood probability in (6), the product of individual conditional probabilities is converted into a sum, which enables a more tractable metric for detection.
log P { q a b | x a } = i = 1 2 N b log p a b , i x a q a b , i c a b , i x a 0 + log 1 p a b , i x a ( 1 q a b , i c a b , i x a 0 ) = i = 1 2 N b w a b , i x a q a b , i c a b , i x a 0 + w ˜ a b , i x a ( 1 q a b , i c a b , i x a 0 ) ,
where w a b , i x a = log p a b , i x a and w ˜ a b , i x a = log 1 p a b , i x a . The above expression is simplified to a negative-weighted sum.
d w q a b , c a b ( x a ) ; w a b ( x a ) , w ˜ a b ( x a ) = log P { q a b | x a } .
This expression motivates the introduction of a weighted Hamming distance function that quantifies the distance between the observed and noise-free quantized outputs using symbol-wise weights. This metric is defined as
x ^ a = argmax x a A 2 N a log P { q a b | x a } = argmin x a A 2 N a d w q a b , c a b ( x a ) ; w a b ( x a ) , w ˜ a b ( x a ) .
The ML decision rule corresponds to the selection of the input vector that yields the smallest weighted Hamming distance in (10).

2.3. JML Detection

A JML detection rule is formulated to enhance detection performance and fully exploit the diversity potential of the system.
The relay protocol operation is illustrated in Figure 1, where the source, relay, and destination nodes are denoted by S, R, and D, respectively. During the first transmission phase (time slot 1), the source broadcasts a signal vector x S received by both the relay and destination nodes. The transmitted signal can be expressed as
q S R = sign ( H S R x S + n S R ) , q S D = sign ( H S D x S + n S D ) .
In the direct transmission path, the destination node attempts to recover the transmitted vector x S based on the quantized observation q S D . Meanwhile, on receiving the quantized signal q S R , the relay node performs signal detection by applying the ML decision rule to estimate x S .
x R = argmin x S A 2 N S d w q S R , c S R ( x S ) ; w S R ( x R ) , w ˜ S R ( x S ) .
During the second transmission phase (time slot 2), the relay forwards the previously detected signal x R to the destination node. The signal transmitted from the relay can be represented as
q R D = sign ( H R D x R + w R D ) .
At the destination node, joint detection is performed by utilizing the quantized signals received from both transmission phases, namely q S D and q R D , to recover the original source signal x S . A widely adopted approach for maximizing diversity in such cooperative systems is the JML detection method, originally proposed by [10], which formulates the decision rule as
x ^ S = argmax x S A 2 N S P { q S R D | x S } = argmax x S A 2 N S P { q S D | x S } × x R A 2 N S P { x R | x S } P { q R D | x R } ,
where the combined quantized observation at the destination is denoted by q S R D = [ q S D T , q R D T ] T , which aggregates the information received over both time slots. The probability that the relay decodes ( x S ) into an incorrect symbol x R is represented by the conditional error probability P { x R | x S } .

2.4. AML Detection

The JML detection approach described in (14) entails significant computational complexity because of the exhaustive search over | A | 4 N S possible symbol combinations. An approximation detection method based on error propagation at the relay is proposed in [26] to alleviate this burden. This method applies a combination of the max-log and PEP approximations to simplify the original JML formulation.
x ^ S = ( a ) argmax x S A 2 N S P { q S D | x S } × max x R A 2 N S P { x R | x S } P { q R D | x R } = argmax [ x S T , x R T ] T A 4 N S P { q S D | x S } P { x R | x S } P { q R D | x R } = ( b ) argmax [ x S T , x R T ] T A 4 N S P { q S D | x S } P { x S x R } P { q R D | x R } .
Step ( a ) employs the max-log approximation to simplify the logarithmic sum of the detection metric. In step ( b ) , the conditional error probability is further approximated using the PEP, which enables a tractable analysis of the detection reliability of the relay.
Term P { x S x R } represents the PEP, which indicates the likelihood that the relay erroneously detects x R given that x S is originally transmitted, and it is also expressed as the weighted Hamming distance function [26].
log P { x S x R }   d w c S R ( x S ) , c S R ( x R ) ; w S R ( x S , x ˜ R ) , w ˜ S R ( x S , x R ) .
Since the PEP admits an upper bound that depends on the weighted Hamming distance between two quantized codewords c a b ( x a ) and c a b ( x ˜ a ) , the detection rule in (15) can be reformulated in a more compact and computationally efficient form as
x ^ S = argmin [ x S T , x R T ] T A 4 N S d w q S D q R D c S R ( x S ) , c S D ( x S ) c R D ( x R ) c S R ( x R ) ; w S D ( x S ) w R D ( x R ) w S R ( x S , x R ) , w ˜ S D ( x S ) w ˜ R D ( x R ) w ˜ S R ( x S , x R ) .
This unified representation consolidates three separate weighted Hamming distance terms into a single expression, simplifying implementation and reducing computational complexity. The detection strategy in (17) enables the interpretation of a DF relay system with an antenna configuration ( N S , N R , N D ) as an equivalent MIMO system comprising ( N S + N R ) transmitting antennas and ( 2 N D + N R ) receiving antennas. This structural equivalence enables the low-complexity detection method proposed in [27] to be applied directly to (17). Consequently, AML achieves a substantial reduction in computational complexity compared to the original JML detection rule.
A comparison of the detection schemes is given below:
  • ML detection: Optimal decision rule for point-to-point MIMO systems. It maximizes the likelihood probability based on the received signal and provides the lowest bit error rate under perfect channel state information.
  • JML detection: An extension of the ML decision rule to cooperative DF MIMO systems. It considers both source-to-destination and relay-to-destination links. However, it suffers from high computational complexity because of an exhaustive search over all possible symbol combinations.
  • AML detection: Low-complexity approximation of JML detection. Its decision rule is derived from a tractable PEP expression, which significantly reduces the computational burden while preserving a near-optimal performance.

3. Performance Analysis

Jensen’s inequality and the Chernoff bound are applied to the likelihood probability of AML to derive a tractable expression. Based on the derived upper bound, the asymptotic behavior of PEP is examined to reveal its relationship with the achievable diversity order.

3.1. PEP Analysis

PEP plays a central role in characterizing the diversity performance of MIMO systems because the overall detection error probability can be upper-bounded by a weighted sum of PEPs over all symbol pairs [28]. However, it is difficult to obtain a closed-form expression for the exact PEP because of the inherent nonlinearity introduced by the one-bit quantizer in (4).
To address this issue, an upper bound on the PEP is derived using Jensen’s inequality and the Chernoff bound, which offers analytical tractability while preserving key performance insights. Jensen’s inequality is applied to handle the square root function, whereas the Chernoff bound is employed to bound the Q-function. This combination of techniques is commonly used to derive the mutual information and bit error rate expressions in communication theory. By leveraging these tools, PEP P { x S x ˜ S } can be obtained by averaging over the channel, which is given by
P { x S x ˜ S } = E { P { x S x ˜ S | H S R D } } ,
where H S R D = [ H S D T , H R D T , H S R T ] T . Given a specific channel realization H S R D , the PEP that erroneously determines in favor of x ˜ S when x S is transmitted can be expressed as
P { x S x ˜ S | H S R D } = q S R D { 1 , 1 } 4 N D + 2 N R P { q S R D | H S R D , x S } × 1 { P { q S R D | H S R D , x S } P { q S R D | H S R D , x ˜ S } } .
The indicator function can be upper bounded using the inequality 1 { A B } B A s , where s [ 0 , 1 ] [29]. Applying this bound to (19) with s = 1 / 2 , the PEP in (19) can be further upper bounded as
P { x S x ˜ S | H S R D } q S R D { 1 , 1 } 4 N D + 2 N R P { q S R D | H S R D , x S } P { q S R D | H S R D , x ˜ S } P { q R D | H S R D , x S } 1 2 = q S R D { 1 , 1 } 4 N D + 2 N R P { q S R D | H S R D , x S } P { q S R D | H S R D , x ˜ S } .
The likelihood probability P { q S R D | H S R D , x S } of the AML is further approximated using the max-log and PEP approximations, following the approach in (15), which yields
P { x S x ˜ S | H S R D } q S D { 1 , 1 } 2 N D q R D { 1 , 1 } 2 N D P { q S D | H S D , x S } P { x S x R } P { q R D | H R D , x R } × P { q S D | H S D , x ˜ S } P { x ˜ S x ˜ R } P { q R D | H R D , x ˜ R } .
Given that i = 1 n a i b i c i i = 1 n a i i = 1 n b i i = 1 n c i when 0 a i , b i , c i 1 , i , the inequality in (21) can be upper-bounded accordingly as
P { x S x ˜ S | H S R D } q S D { 1 , 1 } 2 N D P { q S D | H S D , x S } P { q S D | H S D , x ˜ S } × q R D { 1 , 1 } 2 N D P { q R D | H R D , x R } P { q R D | H R D , x ˜ R } × P { x S x R } P { x ˜ S x ˜ R } .
Subsequently, the PEP is obtained by taking the expectation over channel realizations, which results in
P { x S x ˜ S } E { q S D { 1 , 1 } 2 N D P { q S D | H S D , x S } P { q S D | H S D , x ˜ S } } A 1 × E { q R D { 1 , 1 } 2 N R D P { q R D | H R D , x R } P { q R D | H R D , x ˜ R } } A 2 × E { P { x S x R } P { x ˜ S x ˜ R } } B ,
where the detections of A 1 and A 2 at the destination and relay are independent. Terms A 1 and A 2 in (23) can be derived by using the following lemma
Lemma 1.
E { q a b { 1 , 1 } 2 N b P { q a b | H a b , x a } P { q a b | H b , x ˜ a } }   f ( γ a b , x a , x ˜ a ) 2 N b .
where f ( γ a b , x a , x ˜ a ) = 1 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a 2 N a 2 N a + γ a b x ¯ a 2 + 2 N a 2 N a + γ a b x ˜ ¯ a 2 + 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a .
Proof. 
See Appendix A. □
In addition, term B in (23) can be obtained using the following lemma.
Lemma 2.
E { P { x S x R } P { x ˜ S x ˜ R } } f ( γ S R , x ^ s , x ^ R ) 2 N b ,
where x ^ S = [ x S T , x ˜ S T ] T and x ^ R = [ x R T , x ˜ R T ] T .
Proof. 
Jensen’s inequality is applied to the square root terms in B. Then,
E { P { x S x R } P { x ˜ S x ˜ R } } E { P { x S x R } P { x ˜ S x ˜ R } } = ( a ) f ( γ S R , x ^ s , x ^ R ) 4 N b ,
where the equality in ( a ) follows by applying the PEP bound derived in [30], whose bound P { x a x ˜ a } f ( γ a b , x a , x ˜ a ) 2 N b . x ^ S = [ x S T , x ˜ S T ] T and x ^ R = [ x R T , x ˜ R T ] T are extended symbol vectors that share the same source-to-relay channel H S R . □
By using Lemma 1, the PEP in (23) is obtained by the following theorem.
Theorem 1.
Let x S and x ˜ S represent two symbol vectors to detect x ˜ S ( x S ) when x S is transmitted. The PEP of the symbol vectors for the AML with one-bit ADCs in Rayleigh fading channels is upper bounded as
P { x S x ˜ S } f ( γ S D , x S , x ˜ S ) 2 N D f ( γ R D , x R , x ˜ R ) 2 N D f ( γ S R , x S x ˜ S , x R x ˜ R ) 2 N R ,
where
f ( γ a b , x a , x ˜ a ) = 1 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a 2 N a 2 N a + γ a b x ¯ a 2 + 2 N a 2 N a + γ a b x ˜ ¯ a 2 + 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a .
Theorem 1 shows that the upper bound of the PEP decreases with an increase in the number of receive antennas. This result is in line with the intuition because the probability of successfully distinguishing two distinct symbol vectors increases with a number of independent observations at the receiver, even if these observations are binary. However, this shows that the upper bound of the PEP does not vanish with an increase in the SNR increases because of the use of one-bit ADCs if x a x ˜ a .

3.2. Asymptotic Behavior

The asymptotic upper bound of the PEP is analyzed to gain deeper insight into how PEP influences the diversity gain of AML detection with one-bit ADCs. Therefore, the asymptotic behavior of the array gain function f ( γ a b , x a , x ˜ a ) in Theorem 1 is examined. Subsequently, the diversity gain of PEP is investigated for various combinations of pairwise symbol vectors.
The array gain function f ( γ a b , x a , x ˜ a ) , which governs the behavior of the PEP, exhibits distinct asymptotic characteristics depending on whether x a = x ˜ a or x a x ˜ a . The asymptotic behavior of this array gain function is summarized in the following corollary.
Corollary 1.
Let x a and x ˜ a represent two distinct symbol vectors. Subsequently, the asymptotic behavior of the array gain function f ( γ a b , x a , x ˜ a ) as γ a b is characterized as
  • If x a = x ˜ a , then
    f ( γ a b , x a , x ˜ a ) 2 2 N a x ¯ a γ a b 1 2 .
  • If x a x ˜ a , then
    f ( γ a b , x a , x ˜ a ) 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a .
The corollary states that the asymptotic behavior of the array gain function remains constant when x a x ˜ a . In contrast, the function decays with increasing γ a b at a rate proportional to the order of 1 2 when x a = x ˜ a . This behavior arises because the two symbol vectors (i.e., x a and x ˜ a ) in Rayleigh fading channels become indistinguishable at the receiver when they are not sign-reversed pairs.
Using Corollary 1 and Theorem 1, the asymptotic behavior of PEP for AML using one-bit ADCs can be analyzed as
Corollary 2.
Suppose that x S = x ˜ S and x R = x ˜ R . In this case, full diversity gain can theoretically be achieved if x ^ S = x ^ R . However, under these conditions, it follows that x S = x R , which contradicts the assumption x S = x R . Thus, the PEP behaves as
P { x S x ˜ S } A 1 γ S D N D ,
where A 1 = 2 π arctan x ¯ R + x ˜ ¯ R x ¯ R x ˜ ¯ R 2 N D × 2 π arctan x ^ ¯ S + x ^ ¯ R x ^ ¯ S x ^ ¯ R 2 N R × 2 2 N S x ¯ S .
In this corollary, the full diversity gain of N D + N R is not achieved in cooperative DF MIMO systems with one-bit ADCs. This limitation arises because the full diversity gain can only be obtained when the involved symbol vectors in PEP satisfy specific sign-inversion (i.e., “minus”) conditions. However, these conditions are not satisfied in the presence of source-to-relay detection errors, fundamentally limiting the achievable diversity in these scenarios.
Corollary 3.
Under the conditions x S = x ˜ S , x S = x R , and x ˜ S = x ˜ R , full diversity gain can be achieved because x R = x ˜ R . In this case, PEP behaves as
P { x S x ˜ S } A 2 γ S D N D γ R D N D ,
where A 2 = 2 π arctan x ^ ¯ S + x ^ ¯ R x ^ ¯ S x ^ ¯ R 2 N R × 2 2 N S x ¯ S × 2 2 N R x ¯ R .
Based on Corollary 3, assuming error-free decoding at the relay enables the cooperative MIMO system to achieve full diversity gain contributed by both the source–destination and relay–destination links. However, Corollaries 2 and 3 collectively indicate that the diversity gain of the AML detector with one-bit ADCs is limited to N D + min { 0 , N D } because the decoding success and error at the relay cannot occur simultaneously. Consequently, the achievable diversity gain in the DF MIMO systems is reduced to N D . This result contrasts with the case of the infinite-resolution ADCs studied in [15], where the diversity gain is given by N D + min { N R , N D } .

4. Simulations

The numerical results are obtained via Monte Carlo simulations, averaging over 10 6 independent realizations of the channel matrices and additive noise. Perfect channel state information is assumed at each node to demonstrate the accuracy of the proposed analytical results. Binary phase-shift keying (BPSK) modulation is employed throughout the simulations to focus on the PEP behavior because it facilitates the generation of sign-inverted symbol pairs relevant to the analysis. Therefore, the number of transmit antennas at the source, relay, and destination nodes is fixed at one, whereas the number of receive antennas is varied across simulation scenarios ( N S , N R , N D ) . Each transmission block consists of 256 data symbols, and a rate- 1 2 turbo code is adopted for channel coding. The turbo code is based on a parallel concatenated structure using feedforward and feedback polynomials ( 15 ,   13 ) in the octal notation. In addition, it is assumed that a source-to-relay link is available at the destination node for detection. The block error rate (BLER) and PEP are evaluated to provide the practical system performance and validation of the analytical findings. Key abbreviations and system parameters used in the simulations are listed in Table 1.
The BLER performance of various detection schemes is compared with that of the AML detection method in Figure 2. The BLER of direct communication (DC) is included to highlight the benefits of incorporating a relay. Conventional MRC cooperation exhibits poorer BLER performance than other cooperative methods such as AML and soft decode-and-forward (SDF). Moreover, the slope of the MRC curve significantly differs from those of AML, SDF, and JML, indicating its inability to achieve a diversity gain owing to a lack of robustness against relay detection errors. In contrast, the AML, SDF, and JML schemes exhibit similar BLER slopes, demonstrating their effectiveness in mitigating the error propagation inherent in DF relaying. As a summary, the performance and complexity are provided in Table 2, as shown below:
Figure 3 presents the PEP of AML detection with one-bit ADCs under various transmit/receive antenna configurations when x S = x ˜ S and x R = x ˜ R . To validate Corollary 2, the symbol pairs are selected as x S T , x ˜ S T T = 1 , 1 T and x R T , x ˜ R T = 1 , 1 T , thereby satisfying x S = x ˜ S and x R = x ˜ R . This setup corresponds to a scenario in which decoding errors occur at the relay. Further, the asymptotic upper bound derived in Corollary 2 is plotted for comparison. The asymptotic behavior is analyzed in terms of the slope of the PEP curves, which reflects the diversity gain. The slope of the simulated PEP curves closely matches that of the analytical bound for all antenna configurations. Given that the slope of the analytical bound reflects the diversity gain of the source-to-destination link N D , AML detection does not achieve any diversity gain from source-to-relay link N S under relay decoding errors. Given that the diversity gain depends solely on the source-to-destination link in this case, the PEP improves with an increasing number of receive antennas N D , which is consistent with the theoretical analysis.
In contrast, Figure 4 depicts the PEP for various receive antenna configurations when x S = x ˜ S , x S = x R , and x ˜ S = x ˜ R . The symbol pairs are set as x S T , x ˜ S T T = 1 , 1 T and x R T , x ˜ R T T = 1 , 1 T , ensuring that above conditions are satisfied. This configuration corresponds to a scenario in which decoding at the relay is successful, enabling the cooperative MIMO system to achieve full diversity gain. In this case, the slope of the analytical bound reflects the combined diversity gain from the source-to-relay and source-to-destination links, i.e., 2 N D . Compared to the diversity gain of N D observed in Figure 3, the slope in Figure 4 is significantly steeper. The simulated PEP curves are closely aligned with the analytical bound derived in Corollary 3, demonstrating that AML detection can effectively exploit the additional diversity gain provided by the source-to-relay link when the relay correctly decodes the source symbol.

5. Conclusions

This study investigated the pairwise error probability bounds of cooperative DF MIMO systems using one-bit ADCs over Rayleigh fading channels. The analysis focused on the approximate joint maximum likelihood detection, which was designed for mitigating the error propagation effects commonly observed in DF relaying. A tractable upper bound on the PEP was derived using Jensen’s inequality and Chernoff’s bound. The asymptotic characteristics of the PEP were analyzed to gain further insight into system behavior, revealing how one-bit quantization affects the achievable diversity gain. A key finding was that approximate joint maximum likelihood detection achieved full diversity only when the symbol pairs were sign-inverted and the relay correctly decoded the source symbol vector. The diversity gain was limited to that provided by the source-to-destination link when the relay failed to decode correctly. This represents the first analytical performance characterization of approximate joint maximum likelihood detection for cooperative DF MIMO systems with one-bit ADCs because the nonlinearity of the sign function in one-bit quantization makes the analysis particularly challenging. The validity of the proposed analytical bounds was confirmed through Monte Carlo simulations, which demonstrated excellent agreement with the theoretical predictions.
A potential future direction for this study is to extend the analytical framework to scenarios involving multiple sources, relays, and destinations. In such multi-node settings, the relay’s transmission protocol may differ significantly from the single-node case, depending on the underlying cooperation strategy. Consequently, the analytical approach must be adapted accordingly, making this a distinct line of research beyond the scope of this study.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The author declares no conflicts of interest.

Appendix A

Proof of Lemma 1.
The PEP for a given channel H a b is considered to prove Lemma 1. Subsequently, the expectation over the channel is applied to the considered PEP. For a given channel H a b , B 1 and B 2 in (23) can be further reformulated by utilizing the definition of the likelihood probability in (6), yielding
q a b { 1 , 1 } 2 N b P { q a b | H a b , x a } P { q a b | H a b , x ˜ a } k = 1 2 N b q a b , k { 1 , 1 } P { q a b , k | c a b , k ( x a ) } + P { q a b , k | c a b , k ( x ˜ a ) } 2 × 4 P { q a b , k | c a b , k ( x a ) } P { q a b , k | c a b , k ( x ˜ a ) } ( P { q a b , k | c a b , k ( x a ) } + P { q a b , k | c a b , k ( x ˜ a ) } ) 2 = k = 1 2 N b q a b , k { 1 , 1 } P { q a b , k | c a b , k ( x a ) } + P { q a b , k | c a b , k ( x ˜ a ) } 2 × 4 min { P { q a b , k | c a b , k ( x a ) } , P { q a b , k | c a b , k ( x ˜ a ) } } P { q a b , k | c a b , k ( x a ) } + P { q a b , k | c a b , k ( x ˜ a ) } × 1 min { P { q a b , k | c a b , k ( x a ) } , P { q a b , k | c a b , k ( x ˜ a ) } } P { q a b , k | c a b , k ( x a ) } + P { q a b , k | c a b , k ( x ˜ a ) } .
The right-hand side (RHS) of (A1) can be further upper-bounded as shown in [30], as follows:
q a b { 1 , 1 } 2 N b P { q a b | H a b , x a } P { q a b | H a b , x ˜ a } ( a ) k = 1 2 N b 2 q a b , k { 1 , 1 } min { P { q a b , k | c a b , k ( x a ) } , P { q a b , k | c a b , k ( x ˜ a ) } } 2 A × 1 q a b , k { 1 , 1 } min { P { q a b , k | c a b , k ( x a ) } , P { q a b , k | c a b , k ( x ˜ a ) } } 2 A .
In step ( a ) , Jensen’s inequality is applied to f ( x ) = x ( 1 x ) on the RHS of (A2) [31]. Expression A ( 1 A ) inside the square root in (A2) can be simplified by evaluating it under two distinct cases [30]: when c a b , k ( x a ) = c a b , k ( x ˜ a ) and c a b , k ( x a ) c a b , k ( x ˜ a ) . For c a b , k ( x a ) = c a b , k ( x ˜ a ) , the internal term in the square root is computed as
A ( 1 A ) = 1 | p a b , k ( x a ) p a b , k ( x ˜ a ) | 2 1 1 | p a b , k ( x a ) p a b , k ( x ˜ a ) | 2 = 1 | p a b , k ( x a ) p a b , k ( x ˜ a ) | 2 4 ,
which follows from min { P { q a b , k | c a b , k ( x a ) } , P { q a b , k | c a b , k ( x ˜ a ) } } = 1 | p a b , k ( x a ) p a b , k ( x ˜ a ) | . For c a b , k ( x a ) x a b , k ( x ˜ a ) , A ( 1 A ) is computed as
A ( 1 A ) = p a b , k ( x a ) + p a b , k ( x ˜ a ) 2 1 p a b , k ( x a ) + p a b , k ( x ˜ a ) 2 .
This result follows from the identity min { P { q a b , k | c a b , k ( x a ) } , P { q a b , k | c a b , k ( x ˜ a ) } } = p a b , k ( x a ) + p a b , k ( x ˜ a ) or 2 ( p a b , k ( x a ) + p a b , k ( x ˜ a ) ) . By applying this identity to (A3) and (A4), the upper-bound expression can be reformulated as
q a b { 1 , 1 } 2 N b P { q a b | H a b , x a } P { q a b | H a b , x ˜ a } k : c a b , k ( x a ) c a b , k ( x ˜ a ) 2 p a b , k ( x a ) + p a b , k ( x ˜ a ) 2 1 p a b , k ( x a ) + p a b , k ( x ˜ a ) 2 × k : c a b , k ( x a ) = c a b , k ( x ˜ a ) 2 1 | p a b , k ( x a ) p a b , k ( x ˜ a ) | 2 4 ( a ) k : c a b , k ( x a ) c a b , k ( x ˜ a ) 2 p a b , k ( x a ) + p a b , k ( x ˜ a ) 2 ( b ) k : c a b , k ( x a ) c a b , k ( x ˜ a ) e | h a b , k T x a | 2 + e | h a b , k T x ˜ a | 2 .
Step ( a ) holds because 1 p a b , k ( x a ) + p a b , k ( x ˜ a ) 2 1 and 1 | p a b , k ( x a ) p a b , k ( x ˜ a ) | 2 1 by definition [26]. Step ( b ) is derived by applying the Chernoff bound to the Q-function, using the inequality p a b , k ( x a ) = Q 2 | h a b , k T x a | = e | h a b , k T x a | 2 / 2 [28].
The remaining task is to take an expectation to (A5) over the channel. By considering the expectations on both sides of (A5) with respect to the Rayleigh fading channel H a b ,
E q a b { 1 , 1 } 2 N b P { q a b | H a b , x a } P { q a b | H a b , x ˜ a } E k : c a b , k ( x a ) c a b , k ( x ˜ a ) e | h a b , k T x a | 2 + e | h a b , k T x ˜ a | 2 = ( a ) n = 1 2 N b P { d H c a b ( x a ) , c a b ( x ˜ a ) = n } E e | h a b , k T x a | 2 + e | h a b , k T x ˜ a | 2 n ,
where P { d H c a b ( x a ) , c a b ( x ˜ a ) = n } represent the probability that the Hamming distance between the codewords c a b ( x a ) and c a b ( x ˜ a ) is equal to n. In addition, in step ( a ) , the magnitude | h a b , k T x a | is independent of its sign, i.e., sign ( h a b , k T x a ) = c a b , k ( x a ) .
E q a b { 1 , 1 } 2 N b P { q a b | H a b , x a } P { q a b | H a b , x ˜ a } ( a ) n = 1 2 N b P { d H c a b ( x a ) , c a b ( x ˜ a ) = n } E e | h a b , k T x a | 2 + e | h a b , k T x ˜ a | 2 n .
Step ( a ) follows from the elementary inequality x + y x + y , x , y 0 [30]. Since | h a b , k T x a | 2 = γ a b N a | G ¯ a b , k T x ¯ a | 2 follows a Gamma distribution with shape parameter 1 / 2 and scale parameter γ a b N a x ¯ a 2 , the expectations in (A7) evaluates to
E e | h a b , k T x a | 2 = 1 ( 1 + γ a b 2 N a x ¯ a 2 ) 1 2 = 2 N a 2 N a + γ a b x ¯ a 2 1 2 .
This computation is based on the identity E { e s x } = ( 1 + θ s ) k for x = Γ ( k , θ ) . In addition, the distribution of P { d H c a b ( x a ) , c a b ( x ˜ a ) = n } in (A7) is characterized as in [30].
P { d H c a b ( x a ) , c a b ( x ˜ a ) = n } = 2 N b n 1 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a n 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a 2 N b n .
The final expression can be derived by applying (A8) and (A9) to (A7) as
E q a b { 1 , 1 } 2 N b P { q a b | H a b , x a } P { q a b | H a b , x ˜ a } n = 1 2 N b 2 N b n 1 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a 2 N a 2 N a + γ a b x ¯ a 2 + 2 N a 2 N a + γ a b x ˜ ¯ a 2 n × 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a 2 N b n = ( 1 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a 2 N a 2 N a + γ a b x ¯ a 2 + 2 N a 2 N a + γ a b x ˜ ¯ a 2 + 2 π arctan x ¯ a + x ˜ ¯ a x ¯ a x ˜ ¯ a ) 2 N b .
This completes the proof.

References

  1. Shafi, M.; Molisch, A.F.; Smith, P.J.; Haustein, T.; Zhu, P.; Silva, P.D. 5G: A tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 2017, 35, 1201–1221. [Google Scholar] [CrossRef]
  2. Jiang, W.; Zhang, Q.; He, J.; Habibi, M.A.; Melnyk, S.; El-Absi, M.; Han, B.; Renzo, M.D.; Schotten, H.D.; Luo, F.-L.; et al. Terahertz communications and sensing for 6G and beyond: A comprehensive view. IEEE Commun. Surv. Tutor. 2024, 26, 2326–2381. [Google Scholar] [CrossRef]
  3. Zheng, K.; Liu, X.; Zhu, Y.; Chi, K.; Liu, K. Total throughput maximization of cooperative cognitive radio networks with energy harvesting. IEEE Trans. Wirel. Commun. 2020, 19, 533–546. [Google Scholar] [CrossRef]
  4. Meng, K.; Masouros, C.; Petropulu, A.P.; Hanzo, L. Cooperative ISAC networks: Opportunities and challenges. IEEE Wirel. Commun. 2025, 32, 212–219. [Google Scholar] [CrossRef]
  5. Mossallamy, M.A.E.; Zhang, H.; Song, L.; Seddik, K.G.; Han, Z.; Li, G.Y. Reconfigurable intelligent surfaces for wireless communications: Principles, challenges, and opportunities. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 990–1002. [Google Scholar] [CrossRef]
  6. Zhang, J.; Dai, L.; Li, X.; Liu, Y.; Hanzo, L. On low-resolution ADCs in practical 5G millimeter wave massive MIMO systems. IEEE Commun. Mag. 2018, 56, 205–211. [Google Scholar] [CrossRef]
  7. Liu, J.; Luo, Z.; Xiong, X. Low-resolution ADCs for wireless communication: A comprehensive survey. IEEE Access 2019, 7, 91291–91324. [Google Scholar] [CrossRef]
  8. Khalili, M.; Shirani, S.; Erkip, E.; Eldar, Y.C. MIMO networks with one-bit ADCs: Receiver design and communication strategies. IEEE Trans. Commun. 2021, 69, 6134–6150. [Google Scholar] [CrossRef]
  9. Deng, M.; Cheng, Z.; Wu, L.; Shankar, B.; He, Z. One-bit ADCs/DACs based MIMO radar: Performance analysis and joint design. IEEE Trans. Signal Process. 2022, 70, 2609–2624. [Google Scholar] [CrossRef]
  10. Sendonaris, A.; Erkip, E.; Aazhang, B. User cooperation diversity: Part II: Implementation aspects and performance analysis. IEEE Trans. Commun. 2003, 51, 1939–1948. [Google Scholar] [CrossRef]
  11. Xanthopoulos, N.; Theofanopoulos, N.; Tombras, G.D.; Leivadeas, A. A tutorial on relaying and network coding in cooperative MIMO systems. IEEE Commun. Surv. Tutor. 2023, 25, 345–376. [Google Scholar]
  12. Siddique, S.; Swindlehurst, A.L.; Masouros, C. Advances in cooperative MIMO: Techniques for robust throughput and interference management. IEEE Trans. Signal Process. 2021, 38, 102–115. [Google Scholar]
  13. Guan, W.; Liu, K.J.R. Mitigating error propagation for wireless network coding. IEEE Trans. Wirel. Commun. 2012, 11, 3632–3643. [Google Scholar] [CrossRef]
  14. Chen, D.; Laneman, J.N. Modulation and demodulation for cooperative diversity in wireless systems. IEEE Trans. Wirel. Commun. 2006, 5, 1785–1794. [Google Scholar] [CrossRef]
  15. Kim, H.-M.; Kim, T.-K.; Min, M.; Im, G.H. Low-complexity detection scheme for cooperative MIMO systems with decode-and-forward relays. IEEE Trans. Commun. 2015, 63, 94–106. [Google Scholar]
  16. Safa, K.; Combes, R.; De Lacerda, R.; Yang, S. Data detection in one bit quantized MIMO systems. IEEE Trans. Commun. 2024, 72, 5396–5410. [Google Scholar] [CrossRef]
  17. Yilmaz, G.; Yilmaz, A.O. Pseudo random quantization based two stage detection in one bit massive MIMO systems. IEEE Trans. Wirel. Commun. 2024, 23, 4397–4410. [Google Scholar] [CrossRef]
  18. Shao, M.; Chen, W.K.; Yu, C.Y.; Liu, Y.F.; Ma, W.K. One bit MIMO detection: From global maximum likelihood detector to amplitude retrieval Approach. IEEE Trans. Signal Process. 2024, 72, 7890–7905. [Google Scholar]
  19. Moll’en, C.; Choi, J.; Larsson, E.G.; Heath, R.W. Uplink performance of wideband massive MIMO with one-bit ADCs. IEEE Trans. Wirel. Commun. 2017, 16, 87–100. [Google Scholar] [CrossRef]
  20. Wang, H.; Wen, C.-K.; Jin, S. Bayesian optimal data detector for mmWave OFDM system with low-resolution ADC. IEEE J. Sel. Areas Commun. 2017, 35, 1962–1979. [Google Scholar] [CrossRef]
  21. Kong, C.; Mezghani, A.; Zhong, C.; Swindlehurts, A.L.; Zhang, Z. Multipair massive MIMO relaying systems with one-bit ADCs and DACs. IEEE Trans. Signal Process. 2018, 66, 2984–2997. [Google Scholar] [CrossRef]
  22. Yu, C.; Dai, X.; Yin, H.; Jiang, F. Full-duplex massive MIMO relaying systems with low-resolution ADCs over Rician fading channels. IET Commun. 2019, 13, 3088–3096. [Google Scholar] [CrossRef]
  23. Kim, D.; Hong, S.-N.; Lee, N. Supervised-learning for multihop MU-MIMO communications with one-bit transceivers. IEEE J. Sel. Areas Commun. 2019, 37, 2559–2572. [Google Scholar] [CrossRef]
  24. Kim, S.; Hong, S.-N. A supervised-learning detector for multihop distributed reception systems. IEEE Trans. Veh. Technol. 2019, 68, 1958–1962. [Google Scholar] [CrossRef]
  25. Zhang, J.; Dai, L.; He, Z.; Ai, B.; Dobre, O.A. Mixed ADC/DAC multipair massive MIMO relaying systems: Performance analysis and power optimization. IEEE Trans. Veh. Technol. 2019, 68, 789–803. [Google Scholar] [CrossRef]
  26. Kim, T.K. Cooperative DF protocol for MIMO systems using one-bit ADCs. Sensors 2022, 22, 7843. [Google Scholar] [CrossRef]
  27. Jeon, Y.-S.; Lee, N.; Hong, S.-N.; Heath, R.W. One-bit sphere decoding for uplink massive MIMO systems with one-bit ADCs. IEEE Trans. Wirel. Commun. 2018, 17, 4509–4521. [Google Scholar] [CrossRef]
  28. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  29. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  30. Kim, T.K.; Min, M.; Jeon, Y.-S. Performance bound for MIMO systems using one-bit ADCs over Rayleigh fading channels. IEEE Trans. Veh. Technol. 2022, 71, 9067–9072. [Google Scholar] [CrossRef]
  31. Ash, R.; Doleans-Dade, C. Probability and Measure Theory, 2nd ed.; Academic Press: Cambridge, MA, USA, 1999. [Google Scholar]
Figure 1. One-way relay protocol for cooperative DF MIMO systems using one-bit ADCs.
Figure 1. One-way relay protocol for cooperative DF MIMO systems using one-bit ADCs.
Mathematics 13 02361 g001
Figure 2. BLER of AML detection with different detection schemes when ( N S , N R , N D ) = ( 1 , 8 , 8 ) .
Figure 2. BLER of AML detection with different detection schemes when ( N S , N R , N D ) = ( 1 , 8 , 8 ) .
Mathematics 13 02361 g002
Figure 3. Verification of Corollary 2 for different antenna configurations when x S = x ˜ S and x R = x ˜ R .
Figure 3. Verification of Corollary 2 for different antenna configurations when x S = x ˜ S and x R = x ˜ R .
Mathematics 13 02361 g003
Figure 4. Verification of Corollary 3 for different antenna configurations when x S = x ˜ S , x S = x R , and x ˜ S = x ˜ R .
Figure 4. Verification of Corollary 3 for different antenna configurations when x S = x ˜ S , x S = x R , and x ˜ S = x ˜ R .
Mathematics 13 02361 g004
Table 1. Key abbreviations and system parameters in simulation.
Table 1. Key abbreviations and system parameters in simulation.
Abbreviations and System ParametersDescriptions
DCDirect Communication
MRCMaximum Ratio Combining
SDFSelective Decode and Forward
AMLApproximate Maximum Likelihood
JMLJoin Maximum Likelihood
N S Number of Transmit Antennas at Source Node
N R Number of Transmit Antennas at Relay Node
N D Number of Transmit Antennas at Destination Node
Table 2. Performance and complexity comparison for different detections.
Table 2. Performance and complexity comparison for different detections.
MRCSDFJMLAML
PerformancePoorGoodGoodGood
ComplexityLowLowHighLow
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kim, T.-K. Performance Analysis of Maximum Likelihood Detection in Cooperative DF MIMO Systems with One-Bit ADCs. Mathematics 2025, 13, 2361. https://doi.org/10.3390/math13152361

AMA Style

Kim T-K. Performance Analysis of Maximum Likelihood Detection in Cooperative DF MIMO Systems with One-Bit ADCs. Mathematics. 2025; 13(15):2361. https://doi.org/10.3390/math13152361

Chicago/Turabian Style

Kim, Tae-Kyoung. 2025. "Performance Analysis of Maximum Likelihood Detection in Cooperative DF MIMO Systems with One-Bit ADCs" Mathematics 13, no. 15: 2361. https://doi.org/10.3390/math13152361

APA Style

Kim, T.-K. (2025). Performance Analysis of Maximum Likelihood Detection in Cooperative DF MIMO Systems with One-Bit ADCs. Mathematics, 13(15), 2361. https://doi.org/10.3390/math13152361

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop