Next Article in Journal
Multi-UAVs Tracking Non-Cooperative Target Using Constrained Iterative Linear Quadratic Gaussian
Next Article in Special Issue
Joint Design of Altitude and Channel Statistics Based Energy Beamforming for UAV-Enabled Wireless Energy Transfer
Previous Article in Journal
Event-Triggered Collaborative Fault Diagnosis for UAV–UGV Systems
Previous Article in Special Issue
Autonomous UAV Safety Oriented Situation Monitoring and Evaluation System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Message Passing Detectors for UAV-Based Uplink Grant-Free NOMA Systems

1
Key Laboratory of Grain Information Processing and Control, Ministry of Education, College of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001, China
2
School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou 450001, China
3
Department of Electronic Systems, Aalborg University, 9220 Aalborg, Denmark
4
College of Information Engineering, Nanyang Institute of Technology, Nanyang 473000, China
*
Author to whom correspondence should be addressed.
Drones 2024, 8(7), 325; https://doi.org/10.3390/drones8070325
Submission received: 18 June 2024 / Revised: 12 July 2024 / Accepted: 12 July 2024 / Published: 14 July 2024
(This article belongs to the Special Issue UAV-Assisted Mobile Wireless Networks and Applications)

Abstract

:
Utilizing unmanned aerial vehicles (UAVs) as mobile access points or base stations has emerged as a promising solution to address the excessive traffic demands in wireless networks. This paper investigates improving the detector performance at the unmanned aerial vehicle base stations (UAV-BSs) in an uplink grant-free non-orthogonal multiple access (GF-NOMA) system by considering the activity state (AS) temporal correlation of the different user equipments (UEs) in the time domain. The Bernoulli Gaussian-Markov chain (BG-MC) probability model is used for exploiting both the sparsity and slow change characteristic of the AS of the UE. The GAMP Bernoulli Gaussian-Markov chain (GAMP-BG-MC) algorithm is proposed to improve the detector performance, which can utilize the bidirectional message passing between the neighboring time slots to fully exploit the temporally correlated AS of the UE. Furthermore, the parameters of the BG-MC model can be updated adaptively during the estimation procedure with unknown system statistics. Simulation results show that the proposed algorithm can improve the detection accuracy compared to existing methods while keeping the same order complexity.

1. Introduction

Recently, unmanned aerial vehicle (UAV) assisted communications, such as UAV base stations (UAV-BSs), have garnered significant research interest for their ability to provide rapid and widespread connectivity [1,2,3]. The UAV-BS system can offer a cost-effective and innovative solution to managing fluctuating traffic demands, especially in scenarios where traditional infrastructure-based base stations, which are expensive and slow to deploy, are not financially viable. The UAV-BS can be a data collector for sensor networks in remote or restricted areas [4]. Additionally, it can function as an emergency BS when existing ones fail due to natural disasters or become overwhelmed by sudden surges in traffic [5,6]. However, the large number of potential user equipments (UEs) makes UAV-BS communication difficult and complicated.
Currently, grant-free non-orthogonal multiple access (GF-NOMA) is a promising candidate to support UAV-BS communications. The non-orthogonal multiple access (NOMA) technique enables the system resource block to simultaneously serve multiple UEs [7,8]. At the same time, the grant-free (GF) scheme allows UEs to transmit data to the UAV-BS directly without waiting for its permission, which can decrease the access delay and reduce the control overhead for coordination [9]. In the case of applying GF-NOMA to uplink, recovering the transmitted signal through designing efficient multi-UEs detection methods is challenging, not only due to the large number of UEs present in the cell but also because they are randomly accessing the network in each access slot. However, UEs are only sporadically and randomly activated in practical massive machine-type communications (mMTC) systems, which brings sparsity of the transmitted slots in the time-frequency resource grid [10], which can be changed across different slots within a single frame [11,12]. Furthermore, once a UE is activated for performing the data transmission, it typically requires several consecutive time slots. Then, this UE will be deactivated for a certain period until the next transmission. This activation and deactivation is denoted as activity state (AS), and it exhibits a temporal correlation [13]. Consequently, to enhance the performance of the detectors in a GF-NOMA system, the existing methods incorporate not only the exploitation of sparsity but also the temporal correlation information provided by AS.
According to the literature of GF-NOMA, detectors based on message passing (MP) algorithms [12,13,14] have a better performance compared to conventional compressed sensing (CS) methods. In [12], the authors exploited the temporal correlation of the active UE and modeled it by a Markov process. The authors in [13] utilized the sparse Basianyes learing (SBL) and pattern coupled sparse Basianyes learing (PCSBL) models to formulate the slow change of the UEs AS, then proposed the SBL-based multi-UEs detection algorithms, outperforming CS methods. Then, [14] further embedded the generalized approximate message passing (GAMP) algorithm with the SBL and PCSBL models, and proposed the GAMP sparse Basianyes learing (GAMP-SBL) and the GAMP pattern coupled sparse Basianyes learing (GAMP-PCSBL) detector algorithms, which can reduce the complexity. However, the SBL and PCSBL models mainly consider the sparse structure of the UE activity. Motivated by [12], we find that the Markov chain (MC) better captures the slow change of the AS features with successive time slots and the active UE sparsity simultaneously. Furthermore, differing from [12], the hybrid message passing (HMP) rule [15] is used to update the parameters of the MC on the factor graph (FG) to improve the convergence speed.
This paper focuses on designing a high-performance MP algorithm, resulting in the GAMP-BG-MC detector algorithm for the UAV-BS-based uplink GF-NOMA system. The main contributions of this paper are summarized as follows.
  • The BG-MC model is employed to jointly exploit both the sparse structure of the active UE and the slow change feature in consecutive time slots of the AS. Indeed, the performance of the UAV-BS detector can be improved by updating the AS while considering the temporal correlation. Hence, both the forward messages from the previous slot and the backward messages from the next slot are considered in the MP algorithm at each iteration.
  • Making use of the HMP rule, the GAMP-BG-MC algorithm is proposed to detect the UAV-BS received signal of multiple superimposed UEs. The proposed GAMP-BG-MC algorithm not only calculates the more accurate posterior probability density function (PDF) of the transmitted signal but also adaptively learns the parameters of the prior model during the estimation procedure. Simulation results show that the GAMP-BG-MC algorithm has a better signal-to-noise ratio (SNR) performance as compared to the GAMP-SBL [13,14] and the GAMP-PCSBL [14] algorithms, respectively, while keeping the complexity.
The remaining parts of this paper are organized as follows. Section 2 introduces the system model of the UAV-based uplink GF-NOMA network. Section 3 proposes the GAMP-BG-MC algorithm as the adaptive UAV-BS detector. Then, the numerical results of the proposed algorithm are given in Section 4. Finally, the conclusions of this paper are presented in Section 5.
Notation: Boldface lowercase and uppercase letters denote vectors and matrices; ( · ) T and ( · ) * denote transposition and conjugation, respectively. The expectation of a function f ( x ) w.r.t. a PDF g ( x ) is expressed as f ( x ) g ( x ) ; CN ( x ; μ , v ) denotes x following a complex Gaussian distribution with mean μ and variance v. δ ( · ) is the Dirac delta function.

2. System Model and Factor Graph

2.1. System Model

A typical GF-NOMA system is considered [14], where the UAV-BS is equipped with a single antenna. K potential single-antenna UEs under the service area of a UAV-BS perform GF-NOMA random access (RA), sharing the same bandwidth resource and transmitting signals to the UAV-BS, as illustrated in Figure 1. The transmission is assumed to utilize the multi-carrie code division multiple access (MC-CDMA) scheme detailed in [16], which belongs to the NOMA techniques. The MC-CDMA is a hybrid scheme combing code division multiple access (CDMA) and orthogonal frequency-division multiplexing (OFDM), making the MC-CDMA signal tolerant against frequency selective channels, inter-symbol interference (ISI), and inter-carrier interference (ICI) through the use of cyclic prefix and equalization [17]. The uplink transmission of the UEs is multiplexed over N frequency-divided subcarriers. In each time slot, the ASs of different UEs are assumed to be independent of each other, K a K of which are active and transmit packets to the BS. The active rate p a is used to indicate the percentage of active UEs. The active UE k sends the complex symbol b k from a predefined complex signal constellation and spreads it over the N sub-carriers. Meanwhile, the inactive UE is considered to be transmitting a zero symbol b k = 0 . The received signal y = [ y 1 , , y N ] T at the BS for the j-th time slot can be expressed as
y = H b + w ,
where H = [ h 1 , , h K ] C N × K denotes the complex channel response matrix, representing the spread codes of K UEs over N sub-carriers. b = [ b 1 , , b K ] T is the transmitted signal from K UEs. w = [ w 1 , , w N ] T CN ( 0 , λ 1 I ) denotes the additive white Gaussian noise (AWGN) with the variance λ 1 . The received signals Y = [ y 1 , , y J ] C N × J span J continuous time slots and are represented as a multiple measurement vector (MMV) model, [14]
Y = H B + W ,
where B = [ b 1 , , b J ] C K × J denotes the transmitted signal matrix and the noise is W = [ w 1 , , w J ] C N × J . In a practical mMTC scenario, the potential UEs keep their AS in some random consecutive time slots within the entire frame [10]. As shown in Figure 1, the AS of the UE exhibits a temporal correlation in the time domain, which promotes the sparse structure of signal B in (2). The task of multi-UEs detection is to estimate the sparse transmitted signal B from the received signal Y with the unknown UE activity value.

2.2. Probabilistic Formulation

From (2), the hidden variable Z H B C N × J is defined, where z j = H b j , j J . Then, the detector transfer function can be written as
p ( Y | B ) = p ( Y | Z ) p ( Z | B ) = j = 1 J p ( y j | z j ) p ( z j | b j ) .
The conditional PDF p ( y j | z j ) can be further factorized as
p ( y j | z j ) = n = 1 N p ( y n , j | z n , j ) f Y , n , j = n = 1 N CN ( y n , j ; z n , j , λ 1 ) .
The hard constraint factors provided by p ( z j | b j ) can be concretely represented as
p ( z j | b j ) = n = 1 N p ( z n , j | b j ) f Z , n , j = n = 1 N δ z n , j k = 1 K h n , k b k , j ,
where h n , k denotes the element in the n-th row and k-th column of H .
For the channel prior model, the BG-MC probability model [18] is utilized, which can exploit both the block sparse structure and the slow change of the UE AS feature simultaneously. Each element b k , j has a conditionally independent distribution given by
p ( B | S , V ) = k = 1 K j = 1 J p ( b j , k | s k , j , v k , j ) f B , k , j = δ ( s k , j ) δ ( b k , j ) + δ ( 1 s k , j ) CN ( b k , j ; 0 , v k , j 1 ) ,
where s k , j { 0 , 1 } denotes the MC state implicating if the UE is active ( s k , j = 1 ) or inactive ( s k , j = 0 ) at the j time slot; v k , j 1 is a non-negative hyperparameter controlling the sparsity of the transmitted signal b k , j .
Similar to [12,18,19], the stationary first-order MC is employed to effectively capture the slow evolution of UE AS across time slots. The MC here is given by
p ( S ) = k = 1 K p ( s k ) = k = 1 K p ( s k , 1 ) f S k , 1 j = 2 J p ( s k , j | s k , j 1 ) f S k , j ,
with the initial probability given by p ( s k , 1 ) = ( p k 10 ) s k , 1 ( 1 p k 10 ) 1 s k , 1 , and the transition probability is expressed as
p ( s k , j | s k , j 1 ) = ( 1 p k 10 ) 1 s k , j ( p k 10 ) s k , j , s k , j 1 = 0 , ( p k 01 ) 1 s k , j ( 1 p k 01 ) s k , j , s k , j 1 = 1 .
The MC is characterized by parameters p k 01 Pr ( s k , j = 0 | s k , j 1 = 1 ) and p k 10 Pr ( s k , j = 1 | s k , j 1 = 0 ) for different UEs. Differing from [12,18], the parameters p k 01 , p k 10 are considered as variables, with the prior given by the Beta distributions
p ( p k 01 ) f p k 01 = Be ( p k 01 ; c k , d k ) , p ( p k 10 ) f p k 10 = Be ( p k 10 ; e k , f k ) ,
where c k , d k , and e k , f k can control the initial values of p k 01 and p k 10 , respectively. Meanwhile, the precision term v k , j can be modeled as the Gamma distribution [20], i.e.,
p ( V ) = k = 1 K j = 1 J p ( v k , j ) f v k , j = k = 1 K j = 1 J Ga ( v k , j ; ϵ k , j , η k , j ) ,
where the initial values of v k , j are controlled by the parameters ϵ k , j , η k , j . The main assumptions considered in the system model are summarized in Table 1.

2.3. Factor Graph Representation

Based on (2) and (4)–(10), the joint PDF of all unknown variables given by the observation Y can be factorized as
p ( B , Z , S , V , p 10 , p 01 | Y ) = p ( Y | Z ) p ( Z | B ) p ( B | S , V , p 10 , p 01 ) j = 1 J n = 1 N f Y n , j ( y n , j , z n , j ) f Z n , j ( z n , j , b j ) k = 1 K f B k , j ( b k , j , s k , j , v k , j ) f v k , j ( v k , j ) k = 1 K f p k 01 ( p k 01 ) f p k 10 ( p k 10 ) f S k , 1 ( s k , 1 , p k 10 ) j = 2 J f S k , j ( s k , j , s k , j 1 , p k 10 , p k 01 ) .
The factor graph of (11) is illustrated in Figure 2. In addition, local functions and their corresponding distributions are shown in Table 2. The novel MP algorithm is designed in the next Section.

3. Adaptive UAV-BS Detector Based on the HMP Rule

In this section, the efficient GAMP algorithm is utilized to obtain the likelihood function for the signal b k , j , k , j . The novel GAMP-BG-MC algorithm is proposed, which can adaptively update the parameters and obtain the accurate marginal posterior PDF.

3.1. Computation of the HMP for GAMP-BG-MC Algorithm

The probability model in (6) is implicit in the mix of linear and non-linear functional relationships, i.e., the product and summation operations among the variables as well as the updating of the Gaussian variance, while the single or combined MP rules are unavailable to calculate all the messages directly. Fortunately, the HMP rule proposed in [15] can tackle the message computation problems with the mix of linear and nonlinear models. The idea of the HMP rule [15] is that the FG groups all factor nodes into one set, A Hybrid , while clustering all edges, E , into two sets, E BP and E MF , depicted as solid and dashed lines in Figure 2, respectively. For E BP edges, the messages use the equations (Equations (5) and (6) in [15]) to calculate the messages. Consequently, Equations (7)–(9) in [15] are used to calculate the messages on the E MF . For the convenience of MP algorithm design, the factor graph is divided into four parts, as shown in Figure 2. Part I is the GAMP algorithm to calculate the likelihood function and Part II denotes the MC part for each UE in the time domain. Then, the transition probability automatic update is Part III, and Part IV is used to update the Gaussian variance. Then, the message calculation procedure will be derived separately.

3.1.1. Part I GAMP Part Messages

The GAMP algorithm is used to obtain the likelihood messages n b k , j f B k , j BP ( b k , j ) = CN ( b k , j ; q ^ k , j , v q k , j ) of the variable b k , j based on the received signal Y . The detailed scheme of the GAMP algorithm [21] is summarized in Algorithm 1. In Algorithm 1, the input message is Y , H and the output message v q k , j , q ^ k , j , k , j is obtained after one iteration. At the beginning of Algorithm 1, the belief expectation and variance of the variable b k , j , denoted as b ^ k , j , v b k , j , are first initialized. These values will be updated during the following iterations. In Algorithm 1, lines 1–2, the symbols p ^ n , j , v p n , j denote the expectation and variance of the message m f Z n , j z n , j BP ( b k , j ) = CN ( b k , j ; p ^ n , j , v p n , j ) , respectively. In addition, t n , j denotes an intermediate variable, which will be updated during the iteration. Finally, Algorithm 1 outputs the message n b k , j f B k , j BP ( b k , j ) = CN ( b k , j ; q ^ k , j , v q k , j ) , as shown in lines 4–5.
Algorithm 1: GAMP algorithm
Input: Received signal Y , channel matrix H
Output: v q k , j , q ^ k , j , k , j
Initialize: b ^ k , j = 0 , v b k , j = 1 , k , j ; t n , j = 0 , n , j
// ( Update right output messages: m f Z n , j z n , j BP ( b k , j ) (
1 
n , j : v p n , j = k = 1 K | h n , k | 2 v b k , j
2 
n , j : p ^ n , j = k = 1 K h n , k b ^ k , j t n , j v p n , j
3 
n , j : t n , j = y n , j p ^ n , j λ ^ 1 + v p n , j
// ( Update left output messages: n b k , j f B k , j BP ( b k , j ) (
4 
k , j : v q k , j = n = 1 N | h n , k | 2 λ ^ 1 + v p n , j 1
5 
k , j : q ^ k , j = b ^ k , j + v q k , j n = 1 N h n , k * t n , j
Based on the message n b k , j f B k , j BP ( b k , j ) = CN ( b k , j ; q ^ k , j , v q k , j ) is calculated by Algorithm 1. Then, we first initialize the beliefs b ( v k , j ) = Ga ( v k , j ; ϵ ^ k , j , η ^ k , j ) , whose parameters are updated in (32). The message m f B k , j s k , j BP ( s k , j ) can be calculated by the HMP rule (Equation (5) in [15]), resulting in
m f B k , j s k , j BP ( s k , j ) = π k , j δ ( 1 s k , j ) + ( 1 π k , j ) δ ( s k , j ) ,
where the normalized parameter π k , j is defined as
π k , j = t e m p k , j t e m p k , j + 1 , t e m p k , j e ψ ( ϵ ^ k , j ) CN ( q ^ k , j ; 0 , v q k , j + η ^ k , j / ϵ ^ k , j ) ϵ ^ k , j CN ( q ^ k , j ; 0 , v q k , j ) , ψ ( x ) ln x 1 2 x .

3.1.2. Part II MC Part Messages

Firstly, the beliefs b ( p k 10 ) = Be ( p k 10 ; e ^ k , f ^ k ) and b ( p k 01 ) = Be ( p k 01 ; c ^ k , d ^ k ) can be initialized, and the parameters are updated later in (26). The MC downward messages are obtained by the HMP rule (Equations (5) and (6) in [15]) as
m f S k , j s k , j BP ( s k , j ) = ξ k , j δ ( 1 s k , j ) + ( 1 ξ k , j ) δ ( s k , j ) ,
n s k , j f S k , j + 1 BP ( s k , j ) = ξ k , j δ ( 1 s k , j ) + ( 1 ξ k , j ) δ ( s k , j ) ,
where
ξ k , 1 exp ln p k 10 exp ln p k 10 + exp ln ( 1 p k 10 ) , ξ k , j ξ k , j 1 c 1 + ( 1 ξ k , j 1 ) c 2 ξ k , j 1 ( c 1 + c 4 ) + ( 1 ξ k , j 1 ) ( c 2 + c 3 ) , ξ k , j ξ k , j π k , j ξ k , j π k , j + ( 1 ξ k , j ) ( 1 π k , j ) ,
where c 1 , c 2 , c 3 , c 4 denote the constants and are defined as
c 1 = exp { ln ( 1 p k 01 ) } ; c 2 = exp { ln p k 10 } , c 3 = exp { ln ( 1 p k 10 ) } ; c 4 = exp { ln p k 01 } ,
where ln x Be ( x ; a , b ) = ψ ( a ) ψ ( a + b ) , ln ( 1 x ) Be ( x ; a , b ) = ψ ( b ) ψ ( a + b ) .
Similarly, the MC upward messages passed between s k , j and f S k , j can be computed by Equations (5) and (6) in [15], obtaining
n s k , j f S k , j BP ( s k , j ) = ξ k , j δ ( 1 s k , j ) + ( 1 ξ k , j ) δ ( s k , j ) ,
m f S k , j + 1 s k , j BP ( s k , j ) = ξ k , j δ ( 1 s k , j ) + ( 1 ξ k , j ) δ ( s k , j ) ,
where
ξ k , J π k , j , ξ k , j ξ k , j π k , j ξ k , j π k , j + ( 1 ξ k , j ) ( 1 π k , j ) , ξ k , j ξ k , j + 1 c 1 + ( 1 ξ k , j + 1 ) c 4 ξ k , j + 1 ( c 1 + c 2 ) + ( 1 ξ k , j + 1 ) ( c 3 + c 4 ) ,
where c 1 , c 2 , c 3 , c 4 are the same as (17). The belief b ( s k , 1 ) and the combined belief b ( s k , j , s k , j 1 ) , 2 j J are calculated by Equation (8) in [15], resulting in
b ( s k , 1 ) = B s k , 1 δ ( 1 s k , 1 ) + ( 1 B s k , 1 ) δ ( s k , 1 ) ,
b ( s k , j , s k , j 1 ) = 1 ρ k , j [ B k , j 00 δ ( s k , j 1 ) δ ( s k , j ) + B k , j 01 δ ( 1 s k , j 1 ) δ ( s k , j ) , + B k , j 10 δ ( s k , j 1 ) δ ( 1 s k , j ) + B k , j 11 δ ( 1 s k , j 1 ) δ ( 1 s k , j ) ] ,
where the normalized factors are
B s k , 1 π k , 1 ξ k , 1 ξ k , 1 π k , 1 ξ k , 1 ξ k , 1 + ( 1 π k , 1 ) ( 1 ξ k , 1 ) ( 1 ξ k , 1 ) ,
B k , j 00 ( 1 ξ k , j 1 ) ( 1 ξ k , j ) exp { ln ( 1 p k 10 ) } , B k , j 01 ξ k , j 1 ( 1 ξ k , j ) exp { ln p k 01 } , B k , j 10 ( 1 ξ k , j 1 ) ξ k , j exp { ln p k 10 } , B k , j 11 ξ k , j 1 ξ k , j exp { ln ( 1 p k 01 ) } , ρ k , j B k , j 00 + B k , j 01 + B k , j 10 + B k , j 11 .

3.1.3. Part III Transition Probability Update Part

The messages from f S k , 1 , f S k , j to p k 10 , p k 01 can be calculated by Equation (7) in [15].
m f S k , 1 p k 10 MF ( p k 10 ) Be ( p k 10 ; B s k , 1 + 1 , 2 B s k , 1 ) m f S k , j p k 10 MF ( p k 10 ) Be ( p k 10 ; B k , j 10 ρ k , j + 1 , B k , j 00 ρ k , j + 1 ) m f S k , j p k 01 MF ( p k 01 ) Be ( p k 01 ; B k , j 01 ρ k , j + 1 , B k , j 11 ρ k , j + 1 )
Given the prior messages p ( p k 10 ) and p ( p k 01 ) , the beliefs update by b ( p k 10 ) Be ( p k 10 ; e ^ k , f ^ k ) and b ( p k 01 ) Be ( p k 01 ; c ^ k , d ^ k ) , where the parameters are updated through
e ^ k = B s k , 1 + e k + j = 2 J B k , j 10 ρ k , j , c ^ k = c k + j = 2 J B k , j 01 ρ k , j , f ^ k = 1 B s k , 1 + f k + j = 2 J B k , j 00 ρ k , j , d ^ k = d k + j = 2 J B k , j 11 ρ k , j ,
and the parameters B s k , 1 , B k , j 00 , B k , j 01 , B k , j 10 , B k , j 11 , ρ k , j can be calculated in Equation (24).

3.1.4. Part IV Variance Update Part

The message going out of the MC part from s k , j to f B k , j can be computed by Equation (6) in [15].
n s k , j f B k , j BP ( s k , j ) = π k , j δ ( 1 s k , j ) + ( 1 π k , j ) δ ( s k , j ) ,
where
π k , j ξ k , j ξ k , j ξ k , j ξ k , j + ( 1 ξ k , j ) ( 1 ξ k , j ) .
To update the variance of the BG-MC channel prior distribution, the combined beliefs b ( b k , j , s k , j ) have to be calculated first using Equation (8) in [15] as
b ( b k , j , s k , j ) = ( 1 B b k , j , s k , j ) δ ( s k , j ) δ ( b k , j ) + B b k , j , s k , j δ ( 1 s k , j ) CN ( b k , j ; μ ^ k , j , ϑ k , j ) ,
where
B b k , j , s k , j π k , j t e m p k , j π k , j t e m p k , j + ( 1 π k , j ) , ϑ k , j = ( v q k , j 1 + ϵ ^ k , j η ^ k , j ) 1 , μ ^ k , j = q ^ k , j v q k , j ϑ k , j ,
and the temporary variable t e m p k , j is defined in (13).
Then, the message from f B k , j to variable node v k , j can be computed with the HMP rule (Equation (7) in [15]) as
m f B k , j v k , j MF ( v k , j ) Ga ( v k , j ; B b k , j , s k , j + 1 , B b k , j , s k , j ( | μ ^ k , j | 2 + ϑ k , j ) ) .
Given the prior message m f v k , j v k , j MF ( v k , j ) = Ga ( v k , j ; ϵ k , j , η k , j ) , the belief b ( v k , j ) of variance variable v k , j can be expressed as b ( v k , j ) = Ga ( v k , j ; ϵ ^ k , j , η ^ k , j ) , where the parameters are updated through
ϵ ^ k , j = ϵ k , j + B b k , j , s k , j , η ^ k , j = η k , j + B b k , j , s k , j ( | μ ^ k , j | 2 + ϑ k , j ) .
With the parameters updated in (32), the message from the factor node f B k , j to the variable node b k , j can be computed by the HMP rule (Equation (5) in [15]) as
m f B k , j b k , j BP ( b k , j ) = ( 1 π k , j ) δ ( b k , j ) + π k , j e ψ ( ϵ ^ k , j ) ϵ ^ k , j CN b k , j ; 0 , ϵ ^ k , j η ^ k , j .
Finally, the belief b ( b k , j ) of the variable b k , j can be expressed as
b ( b k , j ) = ( 1 B b k , j ) δ ( b k , j ) + B b k , j CN ( b k , j ; μ ^ k , j , ϑ k , j ) ,
with the parameter B b k , j = B b k , j , s k , j . Then, the algorithm outputs the mean and variance of the belief b ( b k , j ) as
b ^ k , j = b k , j b ( b k , j ) = B b k , j μ ^ k , j , v b k , j = B b k , j ( | μ ^ k , j | 2 + ϑ k , j ) | b ^ k , j | 2 .

3.2. Message Passing Scheduling

The message passing scheme was summarized in the proposed GAMP-BG-MC algorithm, as shown in Algorithm 2. Specifically, the Part I messages are first calculated in parallel at each time slot, as shown in Section 3.1.1, which contains Algorithm 1 and the message going into the Part II. Then, the MC messages can be calculated in sequence in lines 4–7. In Part III, the parameters of p k 10 , p k 01 can be updated in lines 8–10. After that, the accuracy of the outgoing messages in Part IV can be improved by updating the MC part messages, again based on the updated hyperparameters p k 10 , p k 01 . In the final step, the parameters of variance and the calculated output estimated data b ^ k , j , k , j are updated with lines 12–15 in Part IV.
Algorithm 2: GAMP-BG-MC algorithm
Drones 08 00325 i001

4. Simulation Results

This section compares the performance of the proposed GAMP-BG-MC algorithm. As a benchmark, we consider the state-of-the-art algorithms GAMP-SBL [13,14] and GAMP-PCSBL [14], referred to as SBL and PCSBL in the following. Referring to [14], the BPSK modulation scheme is employed in all simulations. To ensure the reproducibility of the results, the simulation setup is described as follows. The simulations were conducted using MATLAB as the programming language, utilizing its built-in functions for matrix operations and signal processing. The parameters used in the experiments are summarized in Table 3. The experiments are conducted in two scenarios compared with the benchmark algorithms. One is the UE activity with temporal correlation, i.e., the UE will transmit the data partially during the whole frame, here denoted as “Partial”. The other is an extreme phenomenon where the UE keeps transmitting data fully to the frame, referred to as “Full”.
For the initialization, according to [15], the prior parameters are { ϵ k , j = η k , j = 1 , k , j } , { e k = f k = c k = d k = 1 , k } , ξ k , j = 1 / 2 , k , j , and the belief parameters are initialized with the same values of the priors. All the experiments are obtained by averaging sim = 1000 Monte Carlo realizations. The experiments use the symbol error rate (SER), defined as SER = log 10 ( K e r r sim × K ) , as a performance metric; K e r r is the number of UE whose symbol is erroneously decoded. The per-iteration complexity of the BG-MC is O ( ( N + 1 ) K J ) , and it is in the same order as the SBL and PCSBL. However, the iteration number of the BG-MC will always be small, as shown in Figure 3.
Figure 3 gives the convergence speed of the three algorithms under SNR = 9 dB, with two scenarios. The proposed BG-MC algorithm has the fastest convergence speed compared with the SBL and PCSBL algorithms in both scenarios, which demonstrates that the proposed algorithm can capture the AS correlation more accurately than the other two algorithms. Especially in the “Partial” scenario, the proposed algorithm converges faster and performs better than the comparison algorithm.
In Figure 4, the simulations compare the average SER performance as a function of the SNRs. The simulation results show that the BG-MC algorithm performs better in the two scenarios. Further, the results show that the PCSBL is better than the SBL in the second scheme and the PCSBL is efficient in characterizing the block sparse structure, while the BG-MC is more accurate, not only in the block sparse structure but also in the cluster sparse structure. The reason for this is that the BG-MC can update the statistic parameters automatically, which is suitable for the practice system.
Figure 5 shows the SER performances as a function of the UE active rate p a under SNR = 9 dB. The BG-MC algorithm outperforms the benchmark algorithms in almost all ranges of p a , especially in the first scenario, which validates the effectiveness of the proposed algorithm.

5. Conclusions

This work proposed an uplink GF-NOMA message-passing detector for UAV-assisted communications. The BG-MC model was first developed to accurately characterize the slow change feature of the AS of all UEs under a GF-NOMA system. Based on the HMP rule, this work designed the GAMP-BG-MC algorithm and tested it with the two scenarios. Numerical results demonstrated that the proposed algorithm not only has a faster convergence speed but also achieves a better SER performance.
In future work, it will be interesting to investigate the impact of channel fading on the multi-user symbol detection in UAV-based GF-NOMA systems, while considering a comprehensive channel model for UAV communication and developing robust detection algorithms that can adapt to varying channel conditions in UAV communication scenarios.

Author Contributions

Conceptualization, P.S. and Z.W.; methodology, Y.S.; software, Y.Z.; validation, Y.S., Y.Z. and X.L.; formal analysis, P.S.; investigation, Z.W.; writing—original draft preparation, Y.S. and K.C.-H.; writing—review and editing, K.C.-H.; funding acquisition, Z.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Science and Technology Research Project of Henan Province under Grants 242102211107; the Natural Science Foundation of China, Grant/Award Number: 61901417; the Natural Science Foundation of Henan, Grant/Award Number: 222300420504; Academic Degrees Graduate Education Reform Project of Henan Province, Grant/Award Number: 2021SJGLX262Y and 2023SJGLX370Y; Postgraduate Education Reform and Quality Improvement Project of Henan Province, Grant/Award Number: YJS2024AL141; Foundation and frontier project of Nanyang, Grant/Award Number: JCQY008.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bor-Yaliniz, I.; Yanikomeroglu, H. The new Frontier in RAN heterogeneity: Multi-tier drone-cells. IEEE Commun. Mag. 2016, 54, 48–55. [Google Scholar] [CrossRef]
  2. Dapper e Silva, T.; Emygdio de Melo, C.F.; Cumino, P.; Rosário, D.; Cerqueira, E.; Pignaton de Freitas, E. STFANET: SDN-based topology management for flying Ad hoc network. IEEE Access 2019, 7, 173499–173514. [Google Scholar] [CrossRef]
  3. Zhang, X.; Wang, H.; Zhao, H. An SDN framework for UAV backbone network towards knowledge centric networking. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 15–19 April 2018; pp. 456–461. [Google Scholar]
  4. Wang, Z.; Duan, L.; Zhang, R. Adaptive deployment for UAV-aided communication networks. IEEE Trans. Wirel. Commun. 2019, 18, 4531–4543. [Google Scholar] [CrossRef]
  5. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Unmanned Aerial Vehicle with Underlaid Device-to-Device Communications: Performance and Tradeoffs. IEEE Trans. Wirel. Commun. 2016, 15, 3949–3963. [Google Scholar] [CrossRef]
  6. Seo, J.B.; Pack, S.; Jin, H. Uplink NOMA random access for UAV-assisted communications. IEEE Trans. Veh. Technol. 2019, 68, 8289–8293. [Google Scholar] [CrossRef]
  7. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  8. Farajzadeh, A.; Ercetin, O.; Yanikomeroglu, H. UAV data collection over NOMA backscatter networks: UAV altitude and trajectory optimization. In Proceedings of the 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–7. [Google Scholar]
  9. Liu, L.; Larsson, E.G.; Yu, W.; Popovski, P.; Stefanovic, C.; de Carvalho, E. Sparse Signal Processing for Grant-Free Massive Connectivity: A Future Paradigm for Random Access Protocols in the Internet of Things. IEEE Signal Proc. Mag. 2018, 35, 88–99. [Google Scholar] [CrossRef]
  10. Li, B.; Zheng, J.; Gao, Y. Compressed sensing based multiuser detection of grant-free NOMA with dynamic user activity. IEEE Commun. Lett. 2021, 26, 143–147. [Google Scholar] [CrossRef]
  11. Gao, Y.; Zheng, J.; Li, B. Multiuser detection of GF-NOMA with dynamic-active users and temporal-correlated channels. IEEE Commun. Lett. 2022, 26, 2380–2384. [Google Scholar] [CrossRef]
  12. Yuan, W.; Wu, N.; Guo, Q.; Ng, D.W.K.; Yuan, J.; Hanzo, L. Iterative joint channel estimation, user activity tracking, and data detection for FTN-NOMA systems supporting random access. IEEE Trans. Commun. 2020, 68, 2963–2977. [Google Scholar] [CrossRef]
  13. Zhang, X.; Fan, P.; Liu, J.; Hao, L. Bayesian learning-based multiuser detection for grant-free NOMA systems. IEEE Trans. Wirel. Commun. 2022, 21, 6317–6328. [Google Scholar] [CrossRef]
  14. Zhang, X.; Fan, P.; Li, H.; Quan, X. Generalized approximate message passing based Bayesian learning detectors for uplink grant-free NOMA. IEEE Trans. Veh. Technol. 2023, 72, 15057–15061. [Google Scholar] [CrossRef]
  15. Song, Y.; Zhang, C.; Lu, X.; Saggese, F.; Wang, Z. Hybrid message passing algorithm for downlink FDD massive MIMO-OFDM channel estimation. IEEE Trans. Wirel. Commun. 2023, 23, 4596–4609. [Google Scholar] [CrossRef]
  16. Frison, C.I.; Mora, H.R.C.; de Almeida, C. MC-CDMA and SCMA performance and complexity comparison in overloaded scenarios. In Proceedings of the 2019 IEEE Colombian Conference on Communications and Computing (COLCOM), Barranquilla, Colombia, 5–7 June 2019; pp. 1–6. [Google Scholar]
  17. Carvajal Mora, H.R.; Garzón, N.V.O.; de Almeida, C. Mean bit error rate evaluation of MC-CDMA cellular systems employing multiuser-maximum-likelihood detector. IEEE Trans. Veh. Technol. 2017, 66, 9838–9851. [Google Scholar] [CrossRef]
  18. Kuai, X.; Chen, L.; Yuan, X.; Liu, A. Structured turbo compressed sensing for downlink massive MIMO-OFDM channel estimation. IEEE Trans. Wirel. Commun. 2019, 18, 3813–3826. [Google Scholar] [CrossRef]
  19. Zhu, W.; Tao, M.; Yuan, X.; Guan, Y. Message Passing-Based Joint User Activity Detection and Channel Estimation for Temporally Correlated Massive Access. IEEE Trans. Commun. 2023, 71, 3576–3591. [Google Scholar] [CrossRef]
  20. Pedersen, N.L.; Manchón, C.N.; Shutin, D.; Fleury, B.H. Application of Bayesian hierarchical prior modeling to sparse channel estimation. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 3487–3492. [Google Scholar]
  21. Mo, L.; Lu, X.; Yuan, J.; Zhang, C.; Wang, Z.; Popovski, P. Generalized Unitary Approximate Message Passing for Double Linear Transformation Model. IEEE Trans. Signal Process. 2023, 71, 1524–1538. [Google Scholar] [CrossRef]
Figure 1. The left part of the figure denotes the uplink transmission from UEs to the base station (BS). The right part of the figure indicates the sparse and temporally correlated structures of the transmit signal B .
Figure 1. The left part of the figure denotes the uplink transmission from UEs to the base station (BS). The right part of the figure indicates the sparse and temporally correlated structures of the transmit signal B .
Drones 08 00325 g001
Figure 2. Factor graph representation for UAV-BS-based GF-NOMA detectors.
Figure 2. Factor graph representation for UAV-BS-based GF-NOMA detectors.
Drones 08 00325 g002
Figure 3. SER vs. Iteration with p a = 0.3 .
Figure 3. SER vs. Iteration with p a = 0.3 .
Drones 08 00325 g003
Figure 4. SER vs. SNR with p a = 0.3 .
Figure 4. SER vs. SNR with p a = 0.3 .
Drones 08 00325 g004
Figure 5. SER vs. p a with SNR = 9 dB.
Figure 5. SER vs. p a with SNR = 9 dB.
Drones 08 00325 g005
Table 1. Main Considered Assumptions.
Table 1. Main Considered Assumptions.
AssumptionDescription
Transmission schemeGF-NOMA scheme is employed for multiple UEs
Single antennaBoth UAV-BS and UEs are equipped with a single antenna
Independent UE ASActivity states of different UEs are assumed to be independent
Channel prior modelThe BG-MC probability model is utilized
GF-NOMA techniqueMC-CDMA scheme, a hybrid of CDMA and OFDM, is utilized
Table 2. Functions of the factor nodes in Figure 2.
Table 2. Functions of the factor nodes in Figure 2.
FactorDistributionFunction
f Y n , j p ( y n , j | z n , j ) CN ( y n , j ; z n , j , λ 1 )
f Z n , j p ( z n , j | b j ) δ z n , j k = 1 K h n , k b k , j
f B k , j p ( b j , k | s k , j , v k , j ) Equation (6)
f v k , j p ( v k , j ) Ga ( v k , j ; ϵ k , j , η k , j )
f S k , 1 p ( s k , 1 | p k 10 ) ( p k 10 ) s k , 1 ( 1 p k 10 ) 1 s k , 1
f S k , j p ( s k , j , s k , j 1 | p k 10 , p k 10 ) Equation (8)
f p k 01 p ( p k 01 ) Be ( p k 01 ; e k , f k )
f p k 10 p ( p k 10 ) Be ( p k 10 ; c k , d k )
Table 3. Parameter settings for the experiment.
Table 3. Parameter settings for the experiment.
Parameter Name Value Parameter Name Value
UE number K 20 Spreading factor N 30
Time slots 6 Algorithm iteration T 20
Modulation scheme BPSK Scenarios Partial and Full
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Song, Y.; Zhu, Y.; Chen-Hu, K.; Lu, X.; Sun, P.; Wang, Z. Message Passing Detectors for UAV-Based Uplink Grant-Free NOMA Systems. Drones 2024, 8, 325. https://doi.org/10.3390/drones8070325

AMA Style

Song Y, Zhu Y, Chen-Hu K, Lu X, Sun P, Wang Z. Message Passing Detectors for UAV-Based Uplink Grant-Free NOMA Systems. Drones. 2024; 8(7):325. https://doi.org/10.3390/drones8070325

Chicago/Turabian Style

Song, Yi, Yiwen Zhu, Kun Chen-Hu, Xinhua Lu, Peng Sun, and Zhongyong Wang. 2024. "Message Passing Detectors for UAV-Based Uplink Grant-Free NOMA Systems" Drones 8, no. 7: 325. https://doi.org/10.3390/drones8070325

APA Style

Song, Y., Zhu, Y., Chen-Hu, K., Lu, X., Sun, P., & Wang, Z. (2024). Message Passing Detectors for UAV-Based Uplink Grant-Free NOMA Systems. Drones, 8(7), 325. https://doi.org/10.3390/drones8070325

Article Metrics

Back to TopTop