+ All Categories
Home > Documents > Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... ·...

Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... ·...

Date post: 15-Aug-2020
Category:
Upload: others
View: 8 times
Download: 0 times
Share this document with a friend
15
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020 3289 Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation Xiaojie Wang , Student Member, IEEE, Chulong Liang , Li Ping , Fellow, IEEE , and Stephan ten Brink , Senior Member, IEEE Abstract— We establish a multiuser extrinsic information transfer (EXIT) chart area theorem for the interleave-division multiple access (IDMA) scheme, a special form of superposition coding, in multiple access channels (MACs). A low-cost multi-user detection (MUD) based on the Gaussian approximation (GA) is assumed. The evolution of mean-square errors (MSE) of the GA-based MUD during iterative processing is studied. We show that the K-dimensional tuples formed by the MSEs of K users constitute a conservative vector field. The achievable rate is a potential function of this conservative field, so it is the integral along any path in the field with value of the achievable rate solely determined by the two path terminals. Optimized error correcting codes can be found given the integration paths in the MSE fields by matching EXIT type functions. The above findings imply that i) low-cost GA detection can provide MAC capacity-approaching performance, ii) the sum-rate capacity can be achieved independently of the integration path in the MSE fields; and iii) the integration path determining achievable rate tuples of all users can be an extra degree of freedom for code design. Index Terms— EXIT chart, non-orthogonal multiple access, area theorem, MAC capacity, multi-user detection. I. I NTRODUCTION C ONSIDER a multiple access channel (MAC) with K users. The MAC capacity region is bounded by 2 K 1 constraints and determined by a tuple of user rates R k , 1 k K [2], [3]. To achieve arbitrary points of the capacity region, joint detection and decoding is required, which has prohibitively high complexity exponential to K. Theoreti- cally, successive interference cancellation (SIC) together with time-sharing or rate-splitting can achieve the entire capacity Manuscript received June 13, 2019; revised November 24, 2019; accepted January 23, 2020. Date of publication February 12, 2020; date of current version May 8, 2020. The work of Chulong Liang and Li Ping was supported by the University Grants Committee of the Hong Kong Special Administrative Region, China, under Grant CityU 11216817 and Grant CityU 11216518. This article was presented at the IEEE International Symposium on Information Theory 2019, Paris, France. The associate editor coordinating the review of this article and approving it for publication was M. Xiao. (Corresponding author: Xiaojie Wang.) Xiaojie Wang and Stephan ten Brink are with the Institute of Telecom- munications, University of Stuttgart, 70569 Stuttgart, Germany (e-mail: [email protected]; [email protected]). Chulong Liang and Li Ping are with the Department of Electronic Engi- neering, City University of Hong Kong, Hong Kong (e-mail: liangchulong@ qq.com; [email protected]). Color versions of one or more of the figures in this article are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TWC.2020.2971999 region [4]. SIC involves subtraction of successfully detected signals. If practical forward error control (FEC) codes are used, each subtraction incurs an overhead in terms of either power or rate loss relative to an ideal capacity achieving code [5, Fig. 13.3]. Such overheads accumulate during SIC steps, moving its performance away from the capacity as K grows. Also, both time-sharing and rate-splitting involve segmenting a data frame of a user into several sub-frames. In practice, the length of a coding frame is restricted by the latency requirement. Frame segmentation results in shorter sub-frames and therefore reduces the coding gain for a practical turbo or low-density parity-check (LDPC) type code [6], which further worsens the losses of accumulation. Iterative detection [7]–[10] can alleviate the loss accu- mulation problem using soft cancellations instead of hard subtraction. A turbo or LDPC code involving iterative detec- tion can be optimized by matching the so-called extrinsic information transfer (EXIT) functions of two local proces- sors, i.e., demapper/detector and FEC decoder, [11], [12]. In a single-user point-to-point channel, such matching can offer near capacity performance, as shown by the area properties [13], [14]. Code-division multiple-access (CDMA) is a conventional approach to the MAC. Iterative multi-user detection (MUD) has been studied for CDMA [15]–[17] with impressive gains. CDMA is capacity achieving under ideal coding and SIC. However, with practical FEC codes, there is still a considerable gap between CDMA performance and the MAC capacity. This is because CDMA is not specifically optimized for iterative detection and decoding, as explained graphically in [18]. Interleave-division multiple-access (IDMA) provides a sim- ple solution to closing this gap [19]. According to information theory, mutually random codebooks for different users are capacity achieving in a MAC [4]. These codebooks can be implemented by assigning each user with a codebook gener- ated from a master codebook using a user-specific interleav- ing, provided that the resultant codebooks are approximately mutually random. This principle underpins IDMA and its theoretically capacity approaching performance. IDMA does also have several practical advantages. As shown in [18], both CDMA and IDMA with LDPC coding can be represented by sparse graphs, but the former is “regu- lar” (prone to a large number of short cycles) while the latter 1536-1276 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information. Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.
Transcript
Page 1: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020 3289

Achievable Rate Region for IterativeMulti-User Detection via Low-Cost

Gaussian ApproximationXiaojie Wang , Student Member, IEEE, Chulong Liang , Li Ping , Fellow, IEEE,

and Stephan ten Brink , Senior Member, IEEE

Abstract— We establish a multiuser extrinsic informationtransfer (EXIT) chart area theorem for the interleave-divisionmultiple access (IDMA) scheme, a special form of superpositioncoding, in multiple access channels (MACs). A low-cost multi-userdetection (MUD) based on the Gaussian approximation (GA)is assumed. The evolution of mean-square errors (MSE) of theGA-based MUD during iterative processing is studied. We showthat the K-dimensional tuples formed by the MSEs of K usersconstitute a conservative vector field. The achievable rate is apotential function of this conservative field, so it is the integralalong any path in the field with value of the achievable ratesolely determined by the two path terminals. Optimized errorcorrecting codes can be found given the integration paths inthe MSE fields by matching EXIT type functions. The abovefindings imply that i) low-cost GA detection can provide MACcapacity-approaching performance, ii) the sum-rate capacity canbe achieved independently of the integration path in the MSEfields; and iii) the integration path determining achievable ratetuples of all users can be an extra degree of freedom for codedesign.

Index Terms— EXIT chart, non-orthogonal multiple access,area theorem, MAC capacity, multi-user detection.

I. INTRODUCTION

CONSIDER a multiple access channel (MAC) with Kusers. The MAC capacity region is bounded by 2K − 1

constraints and determined by a tuple of user rates Rk, 1 ≤k ≤ K [2], [3]. To achieve arbitrary points of the capacityregion, joint detection and decoding is required, which hasprohibitively high complexity exponential to K . Theoreti-cally, successive interference cancellation (SIC) together withtime-sharing or rate-splitting can achieve the entire capacity

Manuscript received June 13, 2019; revised November 24, 2019; acceptedJanuary 23, 2020. Date of publication February 12, 2020; date of currentversion May 8, 2020. The work of Chulong Liang and Li Ping was supportedby the University Grants Committee of the Hong Kong Special AdministrativeRegion, China, under Grant CityU 11216817 and Grant CityU 11216518. Thisarticle was presented at the IEEE International Symposium on InformationTheory 2019, Paris, France. The associate editor coordinating the review ofthis article and approving it for publication was M. Xiao. (Correspondingauthor: Xiaojie Wang.)

Xiaojie Wang and Stephan ten Brink are with the Institute of Telecom-munications, University of Stuttgart, 70569 Stuttgart, Germany (e-mail:[email protected]; [email protected]).

Chulong Liang and Li Ping are with the Department of Electronic Engi-neering, City University of Hong Kong, Hong Kong (e-mail: [email protected]; [email protected]).

Color versions of one or more of the figures in this article are availableonline at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TWC.2020.2971999

region [4]. SIC involves subtraction of successfully detectedsignals. If practical forward error control (FEC) codes areused, each subtraction incurs an overhead in terms of eitherpower or rate loss relative to an ideal capacity achieving code[5, Fig. 13.3]. Such overheads accumulate during SIC steps,moving its performance away from the capacity as K grows.Also, both time-sharing and rate-splitting involve segmentinga data frame of a user into several sub-frames. In practice,the length of a coding frame is restricted by the latencyrequirement. Frame segmentation results in shorter sub-framesand therefore reduces the coding gain for a practical turbo orlow-density parity-check (LDPC) type code [6], which furtherworsens the losses of accumulation.

Iterative detection [7]–[10] can alleviate the loss accu-mulation problem using soft cancellations instead of hardsubtraction. A turbo or LDPC code involving iterative detec-tion can be optimized by matching the so-called extrinsicinformation transfer (EXIT) functions of two local proces-sors, i.e., demapper/detector and FEC decoder, [11], [12].In a single-user point-to-point channel, such matching canoffer near capacity performance, as shown by the areaproperties [13], [14].

Code-division multiple-access (CDMA) is a conventionalapproach to the MAC. Iterative multi-user detection (MUD)has been studied for CDMA [15]–[17] with impressive gains.CDMA is capacity achieving under ideal coding and SIC.However, with practical FEC codes, there is still a considerablegap between CDMA performance and the MAC capacity. Thisis because CDMA is not specifically optimized for iterativedetection and decoding, as explained graphically in [18].

Interleave-division multiple-access (IDMA) provides a sim-ple solution to closing this gap [19]. According to informationtheory, mutually random codebooks for different users arecapacity achieving in a MAC [4]. These codebooks can beimplemented by assigning each user with a codebook gener-ated from a master codebook using a user-specific interleav-ing, provided that the resultant codebooks are approximatelymutually random. This principle underpins IDMA and itstheoretically capacity approaching performance.

IDMA does also have several practical advantages.As shown in [18], both CDMA and IDMA with LDPC codingcan be represented by sparse graphs, but the former is “regu-lar” (prone to a large number of short cycles) while the latter

1536-1276 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 2: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

3290 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020

is randomized with reduced occurrence probability of shortcycles. This difference leads to the performance advantage ofIDMA under iterative processing. More details can be foundin [6], [18]–[20] on iterative processing on random graphs.The connection between the occurrence probability of shortcycles and graph randomization was first revealed in [21].

The complexity of an IDMA receiver can be further reducedby Gaussian approximation (GA) on the residual cross-userinterference during iterative processing (See Sec. II-A belowfor details). The per-user complexity of a GA-based MUDremains roughly the same for all K . For comparison, the com-plexity of a standard a posteriori probability (APP) basedMUD is exponential in K [19].

A question naturally arises: At such low cost, what is theachievable performance of IDMA under GA-based MUD?Some partial answers to this question are available. It wasshown that IDMA is capacity approaching when all users seethe same channel [22]. In [23], [24], the capacity optimalityof IDMA with arbitrary user power and antenna numberwas firstly proved for two-user case and numerically verifiedfor three-user case. However, for the general MAC system,the code design for IDMA becomes difficult when differentusers see different channels. In the latter case, to achievethe entire capacity region, different FEC code rates are gen-erally required. Previous works on IDMA focused on theachievability of some special points in the MAC capacityregion [20], [25]–[28] and/or other aspects, e.g., power controletc. [29]–[34]. To the best of our knowledge, no previouswork has shown that IDMA under the GA-based MUD canachieve the entire MAC capacity region. Recent developmentson IDMA and multiple access for 5G and beyond are dis-cussed with practical implementation techniques in [18], [35],performance comparison among different NOMA schemesin [36], [37] and multi-carrier, multiple antenna and relayaspects in [38]–[40].

This paper analyzes the achievable performance of IDMAunder GA-based MUD. We approach the problem by multi-dimensional curve matching of EXIT type functions. Let vk

be the mean-square error (MSE) (i.e., the variance) of theGA-based MUD for user k, with vk = 0 indicating perfectdecoding. Using the relationship between mutual informa-tion (MI) and minimum MSE (MMSE) derived in [14], [41],we show that the achievable sum-rate can be evaluated usinga line integral along a valid path in the K-dimensional vectorfield v = [v1, v2, · · · , vK ]T . A main finding of this paper isthat the integral is path-independent and its value is solelydetermined by the two terminations. The path independenceproperty greatly simplifies the code optimization problem.

The findings and contributions of this paper are summarizedas follows.

• A low-cost GA-based MUD can provide near optimal per-formance. In particular, it is provably capacity-achievingfor Gaussian signaling.

• Relative to Gaussian signaling, the loss due to discretemodulation can be made arbitrarily small using a super-position coded modulation (SCM) technique.

• FEC codes optimized for single-user channels may notbe good choices for MACs involving low-cost GA-based

MUD [18], [20]. The FEC codes should be carefullydesigned to match MUD, which facilitates iterative detec-tion. We will provide examples for related FEC codedesign for MUD.

• A multi-user area theorem of EXIT chart is establishedfor the code design. We show that the sum-rate capacity isa potential function of the MSE vector field formed by v,which leads to the path independence property. All pointsof the MAC capacity region are achievable using onlyone FEC code per user. This avoids the loss related tothe frame segmentation of SIC as aforementioned.

• The above results can be extended to MIMO MAC chan-nels straightforwardly. We will provide simulation resultsto show that properly designed IDMA can approach thesum-rate MAC capacity for different decoding paths inthe MSE vector field within 1 dB.

This paper is structured as follows. In Sec. II, we presentthe multi-user iterative detection and decoding scheme inIDMA along with the matching condition. Then, we derivethe achievable rates of IDMA and show its implication in codedesign in single antenna setup in Sec. III. The achievable rateanalysis is further extended to MIMO cases in Sec. IV. Sec. Vprovides code design examples and numerical results verifyingour theorems. Finally, Sec. VI concludes the paper.

II. ITERATIVE IDMA RECEIVER

Consider a general K-user MAC system, characterized by

y =K∑

k=1

√Pkhkxk + n, (1)

where Pk denotes the received signal strength of the kth user’ssignal, hk denotes the fading coefficients of the user, xk is thetransmitted signal of the kth user and n is the additive (circu-larly symmetric complex) white Gaussian noise (AWGN) withzero mean and unit variance, i.e., CN (0, σ2 = 1

). We con-

sider complex-valued signals throughout the paper if nototherwise stated. Practically, a sequence of symbols y, formingone or multiple codewords y, is received.

The iterative receiver is depicted in Fig. 1. The elementarysignal estimator (ESE) module has access to the channel obser-vation y and feedbacks x′k from all the users’ decoders. It per-forms the so-called soft interference cancellation (SoIC) andoutputs signals with reduced interference. Each decoder (DEC)performs decoding for a particular user while treating theresidual signals of other users as noise. Through iterativemessage passing between the ESE and DECs, the estimatesare refined and interference suppressed progressively. Moredetails on the ESE/DECs are given below. For the convenienceof discussions, we will assume that xi are modulated usingbinary phase shift keying (BPSK).

A. ESE Functions

The function of the ESE (for elementary signal estimation)module in Fig. 1 is interference cancellation. The outputs of

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 3: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

WANG et al.: ACHIEVABLE RATE REGION FOR ITERATIVE MUD VIA LOW-COST GAUSSIAN APPROXIMATION 3291

Fig. 1. The iterative multi-user detection and decoding model in IDMA.

ESE are a sequence of yk with [19], [29]

yk = y − z̃k =√Pkhkxk + zk, (2a)

zk =K∑

i=1,i�=k

√Pihi (xi − x̂i) + n. (2b)

Here, yk is obtained from y in (1) by canceling out the mean of

the interference z̃k =K∑

i=1,i�=k

√Pihix̂i based on the feedback

of the channel decoders. The soft symbol estimates x̂i aregenerated by feedbacks from the users’ channel decoders.For instance with BPSK signaling, x̂i = tanh

(Li

2

)with Li

being the log-likelihood ratio (LLR) after decoding. For highermodulation schemes, the soft symbol estimates can be obtainedby [42, eqn. 3a], [43]. The feedback from channel decoderswill be discussed later in Sec. II-B. The term zk in (2b)is comprised of AWGN and residual multi-user interference.To reduce complexity, we will adopt Gaussian approxima-tion (GA) assuming that zk is Gaussian-distributed with zeromean and variance σ2

z,k, i.e., CN (0, σ2z,k) .1 From (2b),

we obtain

σ2z,k =

K∑i=1,i�=k

Pi |hi|2 vi + σ2, (3a)

where the MSE of the symbol estimates vi = E[|xi − x̂i|2

]is to characterize the quality of the decoder feedback x̂i. Thecomplexity in (2a) can be reduced by a sum-and-minus trick

by noting that z̃k = Σ − √Pkhkx̂k where Σ =

K∑i=1

√Pihix̂i.

Here Σ is common to all users, so its cost can be shared.The per user cost for (2a) thus does not grow with K. Thequality of the ESE output for user k can be measured by the

1The Gaussian assumption is valid for a large number of users with arbitraryindependently transmitted symbols xi as the consequence of the central limittheorem or if the transmit signals xi are Gaussian by themselves.

signal-to-noise ratio (SNR) offered by yk in (2a)

ρk =Pk |hk|2σ2

z,k

=Pk |hk|2

K∑i=1,i�=k

Pi |hi|2 vi + σ2

,

∀k = 1, 2, . . . ,K. (3b)

Assume that the average power of xi is normalized to 1. Thenvi = 1 in the first iteration, meaning no a priori informationabout xi. During the iterative detection, vi will be updatedusing decoder output (See the discussion in Sec. II-B below).For K users, we express (3b) in a vector form as

ρ = φ (v) , (3c)

where ρ = [ρ1, ρ2, · · · , ρK ]T and v = [v1, v2, · · · , vK ]T .Due to the fact that the MSE is bounded by0 ≤ vi ≤ E

[|xi|2

]= 1, we obtain that the SNR is also

bounded by

ρk,min =Pk |hk|2

K∑i=1,i�=k

Pi |hi|2+σ2

≤ρk≤ Pk |hk|2σ2

= ρk,max. (3d)

We will view (3) as a transfer function from v to ρ.

B. DEC Functions

The refined signals yk in (2) generated by the ESE areforwarded to the DECs. The latter consists of K local decoders(DECs, see Fig. 1) performing extrinsic decoding based on yk

with SNR ρk. To reduce complexity, we will adopt Gaussianapproximation (GA) that zk is Gaussian-distributed with zeromean and variance σ2

z,k. Then the standard decoding opera-tions [6], [12] can be applied to the local decoders. The outputsof an APP decoder are extrinsic messages that are assumed toresemble observations from the AWGN channel, i.e.,

x′k = xk + wk, (4)

where wk follows a Gaussian-distribution CN(0, σ2

w,k

).

Let the MSEs for x̂k be vk after decoding, where x̂k =E[xk|x′k] is the conditional mean estimate of xk based onx′k. The MSEs vk are also the MMSE of the conditional meanestimator due to APP decoding. Thus, we define a transferfunction for DEC k as

vk = E[|xk − E [xk|x′k]|2

]= ψk (ρk) ,

0 ≤ vk ≤ 1, ∀k = 1, 2, . . . ,K. (5a)

Or in a vector form for the overall DEC

v = ψ (ρ) . (5b)

In general, unlike φ (·) in (3c), we do not have an explicitexpression for ψ (·) in (5b); but it can be numerically mea-sured. The details can be found in [44].

In general, ψk (ρk) can be written as

vk =

⎧⎪⎨⎪⎩

1, ρ ≤ ρk,min

ψk (ρk) , ρk,min ≤ ρ ≤ ρk,max

0 ρ ≥ ρk,max.

. (5c)

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 4: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

3292 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020

Here the first case of vk = 1 is for the boundary conditionρ ≤ ρk,min in (3d) at the start of the iterative detection.The last case of vk = 0 is for the boundary conditionρ ≥ ρk,max in (3d) at the end of the iterative detection whenall interference has been perfectly canceled out and perfectdecoding is assumed to be achievable at this point.

To track the convergence behavior of the iterations betweenESE and DECs, we write the SNR ρ and MSE v vector asfunctions of an iteration variable t as

v = v (t) andρ = ρ (t) . (5d)

Let t0 and t∞ denote the start and end of the iterativeprocessing, we require that

v (t0) = ψ (ρ (t0)) = 1, (5e)

v (t∞) = ψ (ρ (t∞)) = 0, (5f)

since we are interested in the error-free decoding cases.

C. Matching Condition

We will say that the ESE and DEC functions are matchedif the following condition is met

ψ (ρ (t)) = φ−1 (ρ (t)) . (6)

Note that the matching condition in (6) is along aK-dimensional line given by ρ (t). It is not required tomatch ψ (ρ) and φ (ρ) in the entire K dimensional space,i.e., requiring ψ (ρ) = φ−1 (ρ). The line matching in (6) ismuch easier. We will show that such line matching achievesthe MAC capacity (see Sec. III-A).

III. ACHIEVABLE RATES

The fundamental relation between achievable rate andMMSE in AWGN channels y = x+ n is found in [41] as

R (snr) =∫ snr

0

mmse (ρ) dρ

for any input distribution of x. The above result is extended toiterative decoding in [14]. Following [14] and also [41], [42],the achievable rate for user k using GA-based MUD is givenby

Rk =∫ ∞

0

f(ρk + f−1 (vk)

)dρk, ∀k = 1, 2, . . . ,K, (7)

where f (ρ) = v is the achievable MMSE for a givenconstellation of x by observing y at the SNR of ρ. Intuitively,ρk and f−1 (vk) give, respectively, the SNRs related to theinput and extrinsic messages of the kth DEC. Hence ρk +f−1 (vk) represents the overall SNR after combining thesetwo messages.

A. Gaussian Alphabets

We first consider the case when xi are Gaussian distributed.This can be approximated by using, e.g., superposition codedmodulation (SCM) [43], [45]–[47]. The MMSE for Gaussian

signals is given by f (ρ) = 11+ρ , and with (7) the achievable

rates can be expressed as

Rk =∫ ∞

0

1ρk (t) + v−1

k (t)dρk (t) , ∀k = 1, 2, . . . ,K. (7a)

Here vk (t) and ρk (t) are related by the function in (3b)and (5), and they are expressed as the functions of t, as intro-duced in (5d). In Appendix A, we will consider (3b) and (5)and rewrite (7a) into the following form:

Rk = −∫ vk=0

vk=1

gk

K∑i=1

givi (t) + σ2

dvk (t)

= −∫ vk=0

vk=1

gk

gT v(t)+σ2dvk (t) , ∀k = 1, 2, . . . ,K, (7b)

where gT =[P1 |h1|2 , P2 |h2|2 , · · · , PK |hK |2

]Tcontains

the powers of all users, v = [v1, v2, · · · , vK ]T and gk =Pk |hk|2 denotes the kth element of vector g. Note thatthe achievable rate expression in (7b) depends on multiplevariables v1, v2, · · · and vK , i.e., the evolution of the MSEs ofall the DECs. This can be intuitively explained by the iterativesoft interference cancellation of the ESE based on other users’DEC feedbacks.

Hence, the achievable sum-rate of all users can be writtenas

Rsum =K∑

k=1

Rk = −∫

v(t)

ggT v (t) + σ2

· dv (t) , (8a)

where (8a) denotes a line integral defined by v (t) , t ∈[t0, t∞]. Notice that the line v (t) is determined by theevolution of the MSE vector v of all DECs. We recall that theterminals of the line are given in (5e) and (5f) as v (t0) = 1and v (t∞) = 0. It can be verified that the integrands in (8a)constitute a gradient of a scalar field (or potential function),i.e., g

gT v+σ2 = ∇vlog(σ2 + gT v

). Thus, the achievable

sum-rate can be written as

Rsum = −∫

L=v(t)

[∇log(σ2 + gT v

)]v′ (t) dt

= log(σ2 + gT v (t0)σ2 + gT v (t∞)

)(5e),(5f)

= log

(1 +

∑Kk=1 Pk |hk|2

σ2

), (8b)

which is independent of the path taken for the integration.We note that the achievable rate in (8b) coincides withthe multi-user Shannon capacity. In other words, any pathwith matched DEC functions can achieve the multi-userShannon capacity. Therefore, the matching condition givenin (6) is a sufficient condition for achieving the sum-ratecapacity. It can be further verified that the matching con-dition also constitutes a necessary condition for achievingthe multi-user Shannon capacity. Consider the case v (t) <

φ−1 (ρ (t)), then we have Rk < −∫ vk=0

vk=1

gk

gT v+σ2 dvk and thus

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 5: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

WANG et al.: ACHIEVABLE RATE REGION FOR ITERATIVE MUD VIA LOW-COST GAUSSIAN APPROXIMATION 3293

Rsum < log(1 +

�Kk=1 Pk|hk|2

σ2

). On the contrary, for the case

ψ (ρ (t)) > φ−1 (ρ (t)), error-free decoding is not possible.This leads to the following theorem.Theorem 1: The achievable sum-rate in IDMA for any path

L (t) : vs = 1 → ve = 0 (starting from vs = 1 to ve = 0) isgiven by the multiuser Shannon capacity

Rsum = −∫

v(t)

f(ρ (t) + f−1 (v (t))

) · dρ (t)

= log

(1 +

∑Kk=1 Pk |hk|2

σ2

)

with the following assumptions1) The exchanged messages during the iterative processing

of the extrinsic and a priori channel are observationsfrom AWGN channels, given in (3a) and (4).

2) The channel decoder is APP (i.e., MAP) decoder.3) The channel encoders and decoders use “matched

codes” for a given path in the MSE vector field givenin (6).

Remark: The assumptions used in Theorem 1 are commonfor turbo-type iterative receivers. It is generally accepted thatthese assumptions are sufficiently accurate for practical sys-tems, based on which turbo and LDPC codes are designed inmany modern communication systems [11], [48]. Theorem 1provides guidelines for the design of FEC codes in the match-ing condition discussed in Sec. II-C for multi-user scenarios.Further, various channel decoders such as BCJR and beliefpropagation (BP) are known for achieving APP performance.

B. Finite Alphabets

If the symbols xi ∈ Si are taken from finite alphabets|Si| < ∞, the capacity formula, in general, can not beexpressed in closed-form. Notice that eq. (7) is still valid, usingthe MMSE-formula for the underlying modulation formatf (ρ) = v. It is also well known that the loss incurred byfinite alphabets, compared with Gaussian, is negligible inthe low-SNR regime. Besides, the Gaussian capacity can beapproached by higher order modulations with shaping and/orSCM [43], [45]–[47].

We provide in the following an achievable rate analysis forIDMA with quadrature phase shift keying (QPSK) signaling.The achievable sum-rate can be written as

Rsum =∫

ρ(t)

fQ

(ρ (t) + f−1

Q (v (t)))dρ (t) , (9)

where fQ (·) denotes the MMSE of QPSK, which is given by

fQ(ρ) = 1 −∫ ∞

−∞tanh(ρ− y

√ρ)e−

y22√

2πdy. (10)

In AWGN channels, Gaussian signals are the hardest toestimate [49], i.e.,

fX (ρ) ≤ fG (ρ) =1

1 + ρ,

for any input distribution X with the same variance. Hence,the achievable rate with distributions other than Gaussian isessentially smaller.

Fig. 2. Achievable rates of multi-user IDMA with matching codes and QPSKmodulation; all users are assumed to have the same power, modulation andcoding scheme; For fair comparison, the multi-user SNR SNRsum = KP/σ2

is used as abscissa.

Example: The users are assumed to have the same powerP with hk = 1, ∀k, and the same modulation and codingscheme. For simplicity, we define t0 = 0 and t∞ = 1 andconsider the following integration path ρ (t)

ρ (t) =P

(K − 1)P + σ21

+(P

σ2− P

(K − 1)P + σ2

)· t · 1, t ∈ [0, 1],

and with (3b)

v (t) =(1 − t)σ2

σ2 + (K − 1)P · t · 1, t ∈ [0, 1].

Then, the achievable rate can be numerically evaluated for thespecified path. We compare the achievable rates using QPSKwith different number of users in Fig. 2 by numerically solvingthe integral (9). Clearly, the loss to Gaussian capacity, due todiscrete modulation, can be made arbitrarily small by imposinga larger number of users or date layers (which may belong to asame user) into the system. Although we assumed equal-powerand equal-rate for simplicity, the achievable rates analysis canbe extended to other general cases straightforwardly.

We will provide code matching examples for a three usercase based on QPSK signaling in Sec. V. The achievable ratescan also be found by the MSE evolution method (computethe SNR-MSE transfer functions), which are very close to theGaussian capacity.

C. Path vs Rate Tuples

Consider a simple two-user case, i.e., K = 2, Fig. 3 illus-trates some special paths and their corresponding achievablerate tuple (or rate pair for K = 2). The simplest path is astraight line between the starting point v (t0) = 1 and the stop

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 6: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

3294 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020

Fig. 3. Illustration (example for two users) of different integration paths achieving different rate pairs (R1, R2); the arrows in the left figure illustrate thetwo-dimensional MSE vector field; the achieved rate pairs are marked in the right figure for the corresponding paths; the dashed lines denote paths achievingrate pairs moving (from the green dot) toward the corresponding SIC corner points.

point v (t∞) = 0, denoted by path 1. It is straightforward toobtain

Rk =gk

gT1log(

1 +gT1σ2

), ∀ k = 1, 2, . . . ,K.

In this case, the achievable rate of each user is proportional tothe received signal power strength gk. This rate tuple coincideswith the point where TDMA/FDMA achieves the sum-ratecapacity (see green dot in Fig. 3). In path 1, it satisfies

v1 (t) = v2 (t) = · · · = vK (t) = v (t) , ∀ t.The matching code for kth user shall have the following MSEcharacteristic function

vk =

⎧⎪⎪⎨⎪⎪⎩

1 ρk ≤ ρk,min

1gT1− gk

·(

1ρk

− σ2

)ρk,min ≤ ρk ≤ ρk,max

0 ρk ≥ ρk,max.

For path 2 and path 3 which are comprised of K segmentsand each segment has merely value change (from vl = 1 tovl = 0) in one particular direction vl, i.e., within the segmentdvl

dt = 0 and dvk

dt = 0, ∀k = l. Depending on the order of thesegments, there exist K! such paths, which constitute the K!SIC corner points of MAC capacity region. The user rate canbe written as

Rk = log

(1 +

gk

K∑l=π(k)+1

gl + σ2

), ∀k = 1, 2, . . . ,K,

where π (k) = k′ denotes the permutation of user decodingorder with 1 ≤ π (k) ≤ K and π (k) = π (k′) , ∀k = k′. Thecorresponding decoding functions are given by

vk = ψk (ρk) =

{1 ρk < ρk,SIC

0 ρk ≥ ρk,SIC

,

where

ρk,SIC =gk

K∑l=π(k)+1

gπ(l) + σ2

are the decoding thresholds. The decoding functions are stepfunctions with sharp transitions at corresponding thresholdSNRs ρk,SIC. This type of decoding functions may posedifficulties for practical code designs, compared to that withsmooth transitions.

D. Achievable Rate Region

To achieve an arbitrary point of the MAC capacity region,the corresponding paths shall be found. In the followingtheorem, we show that the entire MAC capacity region can beachieved by proving the existence of a dedicated path achiev-ing an arbitrary point within the capacity region. Examples forconstructing a dedicated path achieving a feasible rate tupleare provided in case 2 of Sec. V-A.

Theorem 2: Under the assumptions in Theorem 1, IDMAwith GA-based MUD achieves every rate tuple in the K-userMAC capacity region C (K ). Given a feasible target rate tupleR = [R1, R2, · · · , RK ] ∈ C (K ), there exists at least one pathdefined by vR (t) : vs = 1 → ve = 0 which achieves thetarget rate tuple R.

Proof: See Appendix B.Remark: It is easy to prove that there exists a unique

path for each of the K! SIC corner points and the decodingfunctions shall be step functions. For other rate tuples, it canbe verified that there exist many different paths achieving thatrate tuple. The choice of the integration path poses varyingdegrees of difficulty for the design of matching codes. Thus,the design of an appropriate integration path could be an extradegree of freedom for the code design.

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 7: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

WANG et al.: ACHIEVABLE RATE REGION FOR ITERATIVE MUD VIA LOW-COST GAUSSIAN APPROXIMATION 3295

Fig. 4. Evolution of the LLR distribution at the VND during the iterativemulti-user detection and decoding model with K = 4 users at the SNRof 20 dB; the symbol x = +1 is assumed to be transmitted for the userunder test.

E. Gaussian Approximation

We provide in this section numerical evidence showing thatGA used in our achievable rate analysis is accurate enoughfor addressing the behavior of a practical iterative IDMAmulti-user demodulator and decoder. The technique we used totrack the probability density function (PDF) of the exchangedmessages during the iterative processing is discretized densityevolution (DDE) proposed in [50].

GA is arguably true for large number of users (central limittheorem) and/or noise-limited scenarios (the noise densityrather the multiple access interference governs the iterativeprocess). We verified GA through DDE for these cases (resultsomitted). Instead, we show results for the following examplewith a few number of users operating at relatively high SNR,since GA becomes skeptical in these cases.

Example: The number of users is set to K = 4, each withthe same power P = 1

4 and BPSK modulation. The multi-userSNR is −10 logσ2 =20 dB. An LDPC code with the variablenode degree profile (from “edge” perspective) 0.5231λ1 +0.3187λ2 + 0.1582λ11 and the check node degree η2 is usedfor each user. The PDF of the log-likelihood ratio (LLR) at theoutput of the LDPC variable node decoder (VND) is trackedusing DDE with an accuracy of 10 bits and shown in Fig. 4for the first 8 iterations. Clearly, the interference plus noisedoes not resemble a Gaussian density at the first iteration.As the consequence of the soft interference cancellation,the density at VND becomes more Gaussian-like as theiteration proceeds. Similar trend can be observed also at theoutput of ESE and CND (results not shown). Surprisingly,GA is quite accurate even for a few number of users operatingat high SNR regime.

IV. MU-MIMO CHANNEL

Assume that the kth transmitter has Nt,k antennas andthe receiver has NR antennas respectively; then, the received

signal can be written as

y =K∑

k=1

√PkHkxk + n, (11)

where Hk is the channel of the kth user, n denotesthe uncorrelated noise E

[nnH

]= σ2I. In this case,

the ESE module is replaced by an iterative linear MMSE(LMMSE) receiver [42, eqn. (4a)]. Under the LMMSE-basedESE, the SNR of user k can be written as [51]

ρk =

Nt,k∑i=1

hHk,iR

−1hk,i

1 − vk

Nt,k∑i=1

hHk,iR−1hk,i

, (12)

where hk,i denotes the ith column of the kth user’s channelmatrix Hk and

R = σ2nI + HVHH ,

with V = diag (P1v1, P2v2, · · · , PKvK) and H being theconcatenated channels of all users. Following a similarapproach in Appendix A, we obtain with the matching condi-tion in (6) the user rate Rk as

Rk =

⎡⎣− ∫ Nt,k∑

i=1

hHk,iR

−1hk,idvk

⎤⎦vk=0

vk=1

.

Therefore, the sum-rate can be obtained as

Rsum =K∑

i=1

Ri = −∫ v=0

v=1

∇log det [R] dv

= log det[I +

1σ2

n

HHPH], (13)

where P = diag (P1, P2, · · · , PK). Path independence followsfrom the condition

∂vklog det [R] = trace

[R−1HkHH

k

]=

Nt,k∑i=1

hHk,iR

−1hk,i

with Jacobi’s formula.

V. RESULTS

The code design for multi-user can be compli-cated [52]–[55]. For simplicity, we consider a single-inputsingle-output (SISO) setup. We assume that the power levelsgi = Pi|hi|2(i = 1, · · · ,K) are constant in our code design.Thus, the multi-user SNR is defined as

SNRsum =∑K

i=1 gi

σ2. (14)

We consider K = 3 users with the power distribution g =[g1, g2, g3]T = [17 ,

27 ,

47 ]T and we target the sum-rate Rsum =

R1 + R2 + R3 = 1 bpcu as an example. Theoretically,this sum-rate is attainable at the noise variance σ2 = 1.Furthermore, the capacity region (more precisely, the dominantface which maximizes the sum-rate) with Gaussian alphabetsis given by

0.1069 ≤ R1 ≤ log2

(1 +

g1σ2

)= 0.1926,

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 8: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

3296 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020

Fig. 5. ESE transfer function and the matching LDPC code transfer function for three different paths; the x-axis denotes the SNR of ESE and the y-axisdenotes the MSE of the feedback from channel decoder; three users with QPSK and the power distribution g = [g1, g2, g3]T = [ 1

7, 27, 47]T are considered.

0.2224 ≤ R2 ≤ log2

(1 +

g2σ2

)= 0.3626,

0.4854 ≤ R3 ≤ log2

(1 +

g3σ2

)= 0.6521,

R1 +R2 ≤ log2

(1 +

g1 + g2σ2

)= 0.5145,

R1 +R3 ≤ log2

(1 +

g1 + g3σ2

)= 0.7776,

R2 +R3 ≤ log2

(1 +

g2 + g3σ2

)= 0.8931.

A. ESE Functions

According to the matching condition in (6), for thedesign of capacity-achieving codes, the ESE transfer functionsρ(t) = φ(v(t)) shall be determined. For this, we specify theK-dimensional decoding path v(t).

Following the path independence property of Theorem 1,we can constraint v(t) to be a piece-wise linear path withn segments starting from the point v(t = 0) = x0 =1, crossing the intermediate points v(t = i) = xi =[xi,1, · · · , xi,K ]T , i = 1, 2, · · · , n − 1, and terminating at thepoint v(t = n) = xn = 0, where xi = xj , ∀i = j and forpractical decoding

1 ≥ x1,k ≥ x2,k ≥ · · · ≥ xn−1,k ≥ 0 ∀k (15)

shall apply. Therefore, the path can be expressed in a vectorform as

v(t) = xi − (xi − xi+1) · (t− i), t ∈ [i, i+ 1] (16)

for i = 0, 1, 2, · · · , n − 1. With the specified path, the ESEtransfer function for user k can be computed as

ρk = φk (vk) =gk

gT v(t) − gkvk(t) + σ2

=gk

gT[xi − (xi − xi+1) · xi,k−vk

xi,k−xi+1,k

]− gkvk + σ2

,

=gk

K∑k′ �=k

gk′(xi,k′−xi+1,k′xi,k−xi+1,k

vk + xi,kxi+1,k′−xi+1,kxi,k′xi,k−xi+1,k

)+ σ2

,

vk ∈ [xi+1,k, xi,k] for i = 0, 1, 2, · · · , n− 1. (17)

Note that when xi,k = xi+1,k , the above function is notvalid. Actually, ρk is a vertical line from gk

gT xi−gkxi,k+σ2 togk

gT xi+1−gkxi+1,k+σ2 with vk = xi,k . Substituting (16) into(7b), we obtain the user rate Rk

Rk = −∫ vk(t)=0

vk(t)=1

gk

gT v(t) + σ2dvk(t)

=n−1∑i=0

gk(xi,k − xi+1,k)gT (xi − xi+1)

loggT xi + σ2

gT xi+1 + σ2. (18)

To verify the path independence property of Theorems 1and 2, we consider three different paths for (17) and evaluatethe system performance and achievable rates via densityevolution and bit error rate (BER) simulations.

1) Case 1: We do not specify any intermediate point {xi},i.e., n = 1. The path is a straight line between the starting pointv(t = 0) = 1 and the stop point v(t = ∞) = 0, as discussedin Sec. III-C. The ESE function for user k is given by

ρk =gk

(gT 1− gk)vk + σ2, vk ∈ [0, 1]. (19)

The rate for user k is proportional to its power gk,i.e., Rk = gk

gT 1Rsum. Thus, the corresponding rate tuple is(R1, R2, R3) = (1

7 ,27 ,

47 ). The transfer functions in (19) are

depicted in the left most sub-figure in Fig. 5 for the threeusers, respectively.

2) Case 2: We construct a dedicated path to achievean arbitrarily chosen rate tuple in the MAC region, e.g.,(R1, R2, R3) = (0.15, 0.3, 0.55). To find a dedicated path,we search for {xi} by solving K non-linear equations givenby (18). Then, the ESE transfer functions can be obtained bysubstituting {xi} into (17). If n > 2, there are K(n − 1)unknown variables {xi,k}, which is larger than K . Thispotentially lead to multiple solutions. It is noteworthy tomention that the variables {xi,k} are bounded in [0, 1] andshall satisfy (15). We may fix some unknown variables {xi,k}and solve the K non-linear equations given by (18) to obtainremaining unknown variables. Usually, we can fix K(n− 2)unknown variables and have feasible solution for the remainingK unknown variables. Here, we consider a 3-segment path

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 9: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

WANG et al.: ACHIEVABLE RATE REGION FOR ITERATIVE MUD VIA LOW-COST GAUSSIAN APPROXIMATION 3297

TABLE I

CODE OPTIMIZATION RESULTS FOR THREE CASES

having intermediate points

x1 = [x1,1, x1,2, 0]T and x2 = [0, x2,2, 0]T . (20)

Substituting (20) into (18), we obtain

0.15 =g1(1 − x1,1)

1 − g1x1,1 − g2x1,2log2

2g1x1,1 + g2x1,2 + 1

+g1x1,1

g1x1,1 + g2(x1,2 − x2,2)log2

g1x1,1 + g2x1,2 + 1g2x2,2 + 1

,

0.3 =g2(1 − x1,2)

1 − g1x1,1 − g2x1,2log2

2g1x1,1 + g2x1,2 + 1

+g2(x1,2 − x2,2)

g1x1,1 + g2(x1,2 − x2,2)log2

g1x1,1 + g2x1,2 + 1g2x2,2 + 1

+ log2 (g2x2,2 + 1) ,

0.55 =g3

1 − g1x1,1 − g2x1,2log2

2g1x1,1 + g2x1,2 + 1

. (21)

Solving (21), we obtain one feasible solution givenby x1,1 = 0.2145, x1,2 = 0.2056, x2,2 = 0.0618. Substitutingthe solution into (17), we can obtain the ESE functions. Thesetransfer functions are depicted in the middle sub-figure ofFig. 5 for the three users, respectively.

3) Case 3: We randomly choose the intermediatepoints {xi}. Then, substituting the points into (17), we obtain

the ESE transfer functions and subsequently compute the ratefor each user using (18).

Here, we consider a piece-wise linear path with 2 segmentsby specifying an intermediate point arbitrarily, e.g., x1 =[0.5, 0.2, 0.2]. Substituting x1 into (17), we have the ESEfunctions as

ρ1 =

⎧⎪⎨⎪⎩

g1(g2 + g3)0.4v1+σ2

, 0 ≤ v1 ≤ 0.5,g1

g2(1.6v1−0.6)+g3(1.6v1−0.6)+σ2, 0.5 ≤ v1 ≤ 1,

ρ2 =

⎧⎪⎨⎪⎩

g2g12.5v2 + g3v2 + σ2

, 0 ≤ v2 ≤ 0.2,g2

g1(0.625v2 + 0.375) + g3v2 + σ2, 0.2 ≤ v2 ≤ 1,

ρ3 =

⎧⎪⎨⎪⎩

g3g12.5v3 + g2v3 + σ2

, 0 ≤ v3 ≤ 0.2,g3

g1(0.625v3 + 0.375) + g2v3 + σ2, 0.2 ≤ v3 ≤ 1.

These transfer functions are depicted in the right most sub-figure of Fig. 5 for the three users, respectively. The achievablerates for each user, given in (22), is shown at the bottom ofthe next page, can be obtained by substituting x1 into (18),see Tab. I.

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 10: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

3298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020

B. LDPC Code OptimizationAs the ESE functions are readily available, according to the

matching condition, we optimize the degree profile of LDPCcodes to match the ESE functions for user k, i.e.,

vk = ψk(ρk) =

⎧⎪⎨⎪⎩

1, ρk ≤ ρk,min,

φ−1k (ρk), ρk,min ≤ ρk ≤ ρk,max,

0, ρk ≥ ρk,max,

(23)

where φ−1k (ρk) is the inverse of the ESE function of user

k and ρk,min = gk

gT 1−gk+σ2 , ρk,max = gk

σ2 . Using the EXITchart matching techniques [42], [48], [56], [57], the matchingLDPC codes can be designed by properly choosing the degreedistributions.

We basically follow the method described in [56, Appen-dix 5G] to design irregular LDPC codes given a target transferfunction v = ψ(ρ), where ρ is the a priori SNR and v,the decoder output, denotes the extrinsic variance. The dif-ference is that we use mutual information instead of the meanof LLR to track the evolution process.

The asymptotic performance of an LDPC code ensemblecan be specified by its variable node and check node edgedistribution polynomials, namely

λ(x) =dv,max∑

i=1

λixi−1 and η(x) =

dc,max∑i=1

ηixi−1, (24)

where λi (resp., ηi) is the fraction of edges in the bipartitegraph of the LDPC code connected to variable nodes (resp.,check nodes) with degree i, and dv,max (resp., dc,max) is themaximum variable node (resp., check node) degree. Moreover,we use the Gaussian approximation [58], i.e., (3a) and (4),to optimize the edge distributions for the sake of simplicity.

In [48], it is shown that the decoder characteristic for anLDPC code can be computed as

IE,V =dv,max∑

i=1

λi · J(√

(i− 1) [J−1 (IE,C)]2 + 4ρ), (25)

Algorithm 1 Algorithm for LDPC Code Optimization inIDMAInput: Target decoder transfer functions vk = ψk(ρk), check

edge distribution ηk(x), maximum trial T , threshold andmaximum variable degree dv,max.

Output: The optimized variable edge distribution λ(T )(x).1: Initialize λ(0)(x) = x.2: for t = 1 to T do3: Solve (28) by linear programming to obtain λ(t)(x),

where IE,V,fin(ρ) in (28) is obtained by solving (30)using λ(t−1)(x).

4: if 1-

dv,max�i=1

λ(t)i λ

(t−1)i�����dv,max�

i=1(λ

(t)i )2

��dv,max�

i=1(λ

(t−1)i )2

� ≤ then

5: λ(T )(x) = λ(t)(x).6: return λ(T )(x).7: end if8: end for9: return λ(T )(x).

IE,C = 1 −dc,max∑j=1

ηj · J(√

j − 1 · J−1 (1 − IE,V )), (26)

where IE,V (resp., IE,C ) is the extrinsic information fromvariable node (resp., check node) to check node (resp., variablenode), ρ is the decoder input SNR, and the J(·) is defined by

J(σch) = 1 −∫ ∞

−∞

e−(y−σ2

ch/2)2

2σ2ch√

2πσ2ch

· log2

[1 + e−y

]dy,

its inverse function is further denoted by J−1(·). Substituting(26) into (25), we obtain (27), shown at the bottom of thispage, where the LDPC code can be characterized by onesingle variable IE,V . The degree optimization problem can be

R1 =g1(1 − 0.5)

g1(1 − 0.5) + g2(1 − 0.2) + g3(1 − 0.2)log2

(1 + 1

g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1

)+

g1(0.5 − 0)g1(0.5 − 0) + g2(0.2 − 0) + g3(0.2 − 0)

log2 (g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1) = 0.157,

R2 =g2(1 − 0.2)

g1(1 − 0.5) + g2(1 − 0.2) + g3(1 − 0.2)log2

(1 + 1

g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1

)

+g2(0.2 − 0)

g1(0.5 − 0) + g2(0.2 − 0) + g3(0.2 − 0)log2

(g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1

0 + 1

)= 0.281,

R3 =g3(1 − 0.2)

g1(1 − 0.5) + g2(1 − 0.2) + g3(1 − 0.2)log2

(1 + 1

g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1

)+

g3(0.2 − 0)g1(0.5 − 0) + g2(0.2 − 0) + g3(0.2 − 0)

log2

(g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1

0 + 1

)= 0.562. (22)

IE,V =dv,max∑

i=1

λi · J

⎛⎜⎜⎝√√√√√(i− 1)

⎡⎣J−1

⎛⎝1 −

dc,max∑j=1

ηj · J(√

j − 1 · J−1 (1 − IE,V ))⎞⎠⎤⎦2

+ 4ρ

⎞⎟⎟⎠ , (27)

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 11: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

WANG et al.: ACHIEVABLE RATE REGION FOR ITERATIVE MUD VIA LOW-COST GAUSSIAN APPROXIMATION 3299

formulated in (28), shown at the bottom of this page. The costfunction in (28) is to maximize the code rate. Let IE,V,ini(ρ)be the initial extrinsic information given by the channel, whichcan be written as

IE,V,ini(ρ) =dv,max∑

i=1

λi · J(√

(i− 1) [J−1 (0)]2 + 4ρ)

= J (2√ρ) . (29)

Let IE,V,fin(ρ) denote the extrinsic information upon conver-gence, which corresponds to an output extrinsic variance tothe MUD v = ψ(ρ), i.e., given ρ, IE,V,fin(ρ) should satisfythe following equation

dv,max∑i=1

Λi · fQ

(i · [J−1 (IE,C,fin)

]24

)= ψ(ρ), (30)

where fQ is defined in (10), and

IE,C,fin =1 −dc,max∑j=1

ηj · J(√

j − 1 · J−1 (1 − IE,V,fin))

is the converged message from check nodes to variable nodes.Furthermore, we define

Λi =λi/i

dv,max∑i=1

λi/i

as the fraction of variable node of degree i.The optimization in (28) is a non-convex optimization.

However, given {Λi} and η(x), the problem in (28) can besolved using standard linear programming. We use an iterativeway to optimize the edge distribution λ(x) with fixed η(x) inAlgorithm 1. In practice, Algorithm 1 is repeated for severalcheck edge distributions η(x) till a matching code is found.

C. Numerical Results

With Algorithm 1, if we use all variable degrees less thandv,max, the optimization can be quite slow. However, the opti-mized degree sequences are mostly comprised of a few smalldegrees. Therefore, we only use a subset of degrees less thandv,max to run Algorithm 1 more efficiently. In the algorithm,we set T = 100 and = 0.001 for all optimizations. Theoptimized results as well as other parameters are summarized

Fig. 6. BER curves and density evolution results for a three user MAC withmatched codes; three different paths and QPSK signaling are considered.

in Table I. Fig. 5 shows the optimized LDPC DEC transferfunctions (denoted by dashed lines). The DEC functions matchenough well with the ESE functions.

After matching the degree distribution, we construct paritycheck matrices for BER simulations. The parity-check matrixof code-word length 105 for each user in each case is randomlygenerated and subsequently we remove the cycle-4 loops inthe matrix by edge permutation [59]. Furthermore, we con-sider QPSK signaling in the simulation to verify that ourTheorems work also well with finite alphabets, not only withGaussian alphabets.

Fig. 6 shows the average BER performance for three userswith matching codes along different decoding paths (denotedby solid lines, respectively), where we set a maximum iterationof 1000 between the ESE detector and the LDPC decoders.Moreover, the Shannon limit at the sum-rate Rsum = 1 alongwith the density evolution performance with optimized codesconsidering QPSK are provided. From the numerical results,we can conclude that

• the evolution thresholds for three cases with QPSK areclose to the Gaussian capacity. The loss incurred by finitealphabets is negligible at the target sum-rate.

max{λi}

dv,max∑i=1

λi

i

s.t.dv,max∑

i=1

λi = 1,

dv,max∑i=1

λi · J

⎛⎜⎜⎝√√√√√(i− 1)

⎡⎣J−1

⎛⎝1 −

dc,max∑j=1

ηj · J(√

j − 1 · J−1 (1 − IE,V ))⎞⎠⎤⎦2

+ 4ρ

⎞⎟⎟⎠ > IE,V

for ∀0 < ρ <∞ and IE,V,ini(ρ) ≤ IE,V ≤ IE,V,fin(ρ). (28)

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 12: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

3300 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020

Fig. 7. Evolution and simulation trajectories for three cases at SNRsum = 1 dB; Left: 3-D diagram for a trajectory (v1, v2, v3); Right: Side view (v1, v3)of a trajectory.

• Three cases have BER below 10−4 within 1 dB to theShannon limit. The sum-rate capacity can be achieved fordifferent paths also with QPSK signaling.

• For case 2, we computed a dedicated path to achievean arbitrarily chosen rate tuple (R1, R2, R3) =(0.15, 0.3, 0.55). The numerical results also verified ourpath construction based on GA.

• Case 1 has the worst performance; this may be due to itsworst girth property of the randomly constructed paritycheck matrix because of its low code-rate; we conjec-ture that more sophisticated methods of parity checkmatrix design, e.g., progressive edge growth (PEG) [60]and methods in [61] could be used to improve itsperformance.

To further verify that the decoding path (or decodingtrajectory L(t)) in the BER simulation is close to the desiredtheoretical path, we compare the decoding trajectories obtainedvia density evolution and BER simulation for three cases at theSNR SNRsum = 1 dB, where all users can decode its signalwith high probability. The evolution trajectories differ fromthe specified paths (discussed in Sec. V-A) mainly due to thedifferent SNRs (the specified paths assume SNRsum = 0 dB).We observe that the simulation trajectories are consistent withthose of density evolution for all three cases. This furtherconsolidates the path independence theorem, and providesnumerical evidence to the validity of Theorem 1 with finitealphabet cases.

D. High Rate

For scenarios where high rates for users are required,SCM [43], [45] can be applied. We consider the case that thedata layers in SCM are of the same power. Suppose that wehave a K-user system with power allocation [g1, g2, · · · , gK ]T .The decoding path x0 → x1 → · · · → xn is also specified.

Then, we can convert this unequal power system into anequivalent equal power system as follows.

• Find a real number g > 0 such that Li = gi/g is aninteger for all i.

• Change each K-dimension point xi into a point x′i with

dimension L =∑K

i=1 Li as follows.

x′i =

⎡⎢⎢⎣xi,1, · · · , xi,1︸ ︷︷ ︸

L1 copies

, xi,2,· · ·, xi,2︸ ︷︷ ︸L2 copies

, · · · , xi,K , · · · , xi,K︸ ︷︷ ︸LK copies

⎤⎥⎥⎦ .

• Finally, we have an equal power system with L virtualusers each with power g and the decoding path isx′

0 → x′1 → · · · → x′

n, where the original user i isthe superposition of the virtual users with indices from1 +∑i−1

j=1 Lj to∑i

j=1 Lj .

By substituting the modified power allocation and pathinto (18), it is easy to find that the equal power system satisfiesthe requirement of the original K-user system.

Table I shows the optimized LDPC code for a targetedsum-rate of Rsum = 2 for case 2, where the individualuser rate is pre-defined and a dedicated decoding path isthen specified to achieve that rate tuple. For the simplicityof code design, we apply SCM to each user. In particular,the to be transmitted data packet for user 2 and user 3 isdivided into two and four independent data layers, respectively.By doing this, the three-user MAC system is converted to aMAC system with seven “users”, each with the same transmitpower. The main motivation for applying SCM is that thecurve matching code design becomes difficult at high rate [22].It may require rather complicated joint design of modulationand coding scheme for each user. Simulation and densityevolution results are depicted in Fig. 8 for the most interestingcase 2 (user rate is prescribed). Compared to the low-ratescenario in Fig. 6, the gap to Shannon-limit increases both for

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 13: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

WANG et al.: ACHIEVABLE RATE REGION FOR ITERATIVE MUD VIA LOW-COST GAUSSIAN APPROXIMATION 3301

Fig. 8. BER and density evolution results for a three-user MAC withmatched codes at the sum-rate Rsum = 1.964; SCM and QPSK signalingare considered.

density evolution and simulation results at high rate (0.4 dBand 1.5 dB respectively). Nonetheless, we conjecture that thisgap can be reduced by imposing more data layers. However,increasing the number of data layers essentially decreases thecode-rate per layer. It is a rather challenging task to designlow-rate LDPC codes with good performance [62], [63].To this end, more complexity-demanding and sophisticatedLDPC code design methods such as density evolution [12],generalized constraint nodes based on Hadamard codes [63],serial concatenation with a repetition code [20] and PEG [60]may be used in future work to verify this conjecture.

VI. CONCLUSION

We proved under Gaussian approximation (GA) thatthe simple interleave-division multiple-access (IDMA), rely-ing on a low-cost GA based multi-user detector (MUD),is capacity-achieving for the general Gaussian multiple accesschannels (GMAC) with arbitrary number of users, power dis-tribution and with single or multiple antennas. We showed thatIDMA with matching codes is capacity-achieving for arbitrarydecoding path in the mean-square error (MSE) vector field.This property was further used to prove that IDMA achievesnot only the sum-rate capacity, but the entire GMAC capacityregion. The construction of capacity-achieving codes was alsoprovided by establishing an area theorem for multi-user extrin-sic information transfer (EXIT) chart. We provided numericalevidence supporting GA and our achievable rate analysis.

APPENDIX APROOF OF (7b)

Let the SNR of the output of ESE be ρk,min, ρk,max

as defined in (3d). Since the achievable rate formula in (7)requires the integration for the SNR ρ spanning (0,∞),

we explicitly write the transfer function of the DECs as

vk =

⎧⎪⎨⎪⎩

1, ρ ≤ ρk,min

ψk (ρk) , ρk,min ≤ ρ ≤ ρk,max

0 ρ ≥ ρk,max

.

We also assume that the matching condition in (6) holds. Then,the achievable rates can be expressed as

Rk =∫ ρk,max

ρk,min

1ρk + v−1

k

dρk +∫ ρk,min

0

1ρk + 1

dρk.

Let ρ′k be the first derivative of ρk with respect to vk, we obtain

Rk

ρ′k=

dρkdvk=∫ vk=0

vk=1

ρ′kρk + v−1

k

dvk +∫ ρk,min

0

1ρk + 1

dρk

=∫ 0

1

ρ′k − v−2k + v−2

k

ρk + v−1k

dvk + log (1 + ρk,min)︸ ︷︷ ︸=w0

=[log(ρk + v−1

k

)+∫

v−2k

ρk + v−1k

dvk

]vk=0

vk=1

+ w0

=[log(ρk + v−1

k

)+∫ (

v−1k − 1

ρ−1k +vk

)dvk

]vk=0

vk=1

+w0.

Let gk = Pk |hk|2 be the kth element of the vector gand v = [v1, v2, · · · , vK ], we can express (3b) as ρk =gk/(gT v − gkvk + σ2

)and obtain

Rk(3a)=[log(ρk + v−1

k

)+ log vk −

∫gk

gT v + σ2dvk

]vk=0

vk=1

+w0

=[log (ρkvk + 1) −

∫gk

gT v + σ2dvk

]vk=0

vk=1

+ w0

= −∫ 0

1

gk

gT v + σ2dvk,

where the last equality is due to w0 = log (1 + ρk,min) =log (1 + ρk (vk = 1)).

APPENDIX BPROOF OF THEOREM 2

The user rate Rk = −∫ vk=0

vk=1

gk

gT v+σ2 dvk is a continu-

ous and monotonically decreasing function of v. If vk areunbounded, then Rk can take on any value with the sin-gle sum-rate constraint

∑Rk ≤ log

(gT 1+σ2

σ2

). In other

words, there exists at least one integration path which allowsachieving an arbitrary point within the region determined by∑

Rk ≤ log(

gT 1+σ2

σ2

). However, the value range of Rk

is constrained by the fact that 0 ≤ vl ≤ 1, ∀l. Furthermore,the integrand gk

gT v+σ2 is monotonically decreasing with vl,∀l = k. Therefore, the maximum of the kth user rate Rk isattained when vl = 0, ∀l = k, i.e.,

Rk ≤ −∫ vk=0

vk=1

gk

gkvk + σ2dvk = log

(gk + σ2

σ2

).

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 14: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

3302 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 19, NO. 5, MAY 2020

Similarly, the following constraints can also be obtained

Rk +Rl ≤ log(gk + gl + σ2

σ2

), ∀k = l

Rk +Rl +Rm ≤ log(gk + gl + gm + σ2

σ2

), ∀k = l = m

......∑

Rk ≤ log(

gT 1 + σ2

σ2

),

and these constraints constitute the MAC capacity region.Hence, for any point in rate region determined by the aboveconstraints (or equivalently the K-user MAC capacity region),there exists at least an integration path constrained by vl,∀l = k achieving that point.

REFERENCES

[1] X. Wang, C. Liang, L. Ping, and S. T. Brink, “Achievable rate regionfor iterative multi-user detection via low-cost Gaussian approximation,”in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2019, pp. 455–459.

[2] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed.Hoboken, NJ, USA: Wiley, 2006.

[3] A. El Gamal and Y.-H. Kim, Network Information Theory. Cambridge,U.K.: Cambridge Univ. Press, 2011.

[4] D. Tse and P. Viswanath, Fundamentals of Wireless Communications.Cambridge, U.K.: Cambridge Univ. Press, 2005.

[5] Y. Hu and L. Ping, “Interleave-division multiple access (IDMA),” inMultiple Access Techniques for 5G Wireless Networks and Beyond,M. Vaezi, Z. Ding, and H. V. Poor, Eds. New York, NY, USA: Springer,2019, ch. 13, pp. 417–449.

[6] T. Richardson and R. Urbanke, Modern Coding Theory, 1st ed.Cambridge, U.K.: Cambridge Univ. Press, 2008.

[7] C. Schlegel, R. Kempter, and P. Kota, “A novel random wireless packetmultiple access method using CDMA,” IEEE Trans. Wireless Commun.,vol. 5, no. 6, pp. 1362–1370, Jun. 2006.

[8] M. Jiang, J. Akhtman, and L. Hanzo, “Iterative joint channel estimationand multi-user detection for multiple-antenna aided OFDM systems,”IEEE Trans. Wireless Commun., vol. 6, no. 8, pp. 2904–2914, Aug. 2007.

[9] P. A. Hoeher, S. Badri-Hoeher, W. Xu, and C. Krakowski, “Single-antenna co-channel interference cancellation for TDMA cellular radiosystems,” IEEE Wireless Commun., vol. 12, no. 2, pp. 30–37, Apr. 2005.

[10] M. Zhao, Z. Shi, and M. Reed, “Iterative turbo channel estimationfor OFDM system over rapid dispersive fading channel,” IEEE Trans.Wireless Commun., vol. 7, no. 8, pp. 3174–3184, Aug. 2008.

[11] S. T. Brink, “Exploiting the chain rule of mutual information for thedesign of iterative deoding shemes,” in Proc. 39th Annu. Allerton Conf.Commun., Control Comput., 2001, pp. 293–300.

[12] T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, “Design ofcapacity-approaching irregular low-density parity-check codes,” IEEETrans. Inf. Theory, vol. 47, no. 2, pp. 619–637, Feb. 2001.

[13] A. Ashikhmin, G. Kramer, and S. T. Brink, “Extrinsic informationtransfer functions: Model and erasure channel properties,” IEEE Trans.Inf. Theory, vol. 50, no. 11, pp. 2657–2673, Nov. 2004.

[14] K. Bhattad and K. R. Narayanan, “An MSE-based transfer chart foranalyzing iterative decoding schemes using a Gaussian approximation,”IEEE Trans. Inf. Theory, vol. 53, no. 1, pp. 22–38, Jan. 2007.

[15] M. Reed, C. Schlegel, P. Alexander, and J. Asenstorfer, “Iterative multi-user detection for CDMA with FEC: Near-single-user performance,”IEEE Trans. Commun., vol. 46, no. 12, pp. 1693–1699, Dec. 1998.

[16] X. Wang and H. Poor, “Iterative (turbo) soft interference cancellationand decoding for coded CDMA,” IEEE Trans. Commun., vol. 47, no. 7,pp. 1046–1061, Jul. 1999.

[17] F. N. Brannstrom, T. M. Aulin, and L. K. Rasmussen, “Iterativemulti-user detection of trellis code multiple access using a posterioriprobabilities,” in Proc. IEEE Int. Conf. Commun., vol. 1, Jun. 2001,pp. 11–15.

[18] Y. Hu, C. Liang, J. Hu, and L. Ping, “Low-cost implementation tech-niques for interleave division multiple access,” IEEE Wireless Commun.Lett., vol. 7, no. 6, pp. 1026–1029, Dec. 2018.

[19] L. Ping, L. Liu, K. Wu, and W. K. Leung, “Interleave division multiple-access,” IEEE Trans. Wireless Commun., vol. 5, no. 4, pp. 938–947,Apr. 2006.

[20] X. Wang, S. Cammerer, and S. T. Brink, “Near-capacity detection anddecoding: code design for dynamic user loads in Gaussian multipleaccess channels,” IEEE Trans. Commun., vol. 67, no. 11, pp. 7417–7430,Nov. 2019.

[21] S. Benedetto and G. Montorsi, “Unveiling turbo codes: Some results onparallel concatenated coding schemes,” IEEE Trans. Inf. Theory, vol. 42,no. 2, pp. 409–428, Mar. 1996.

[22] Y. Hu, C. Liang, L. Liu, C. Yan, Y. Yuan, and L. Ping, “Interleave-division multiple access in high rate applications,” IEEE WirelessCommun. Lett., vol. 8, no. 2, pp. 476–479, Apr. 2019.

[23] L. Liu, C. Yuen, Y. L. Guan, and Y. Li, “Capacity-achieving iterativeLMMSE detection for MIMO-NOMA systems,” in Proc. IEEE Int. Conf.Commun., May 2016, pp. 1–6.

[24] L. Liu, Y. Chi, C. Yuen, Y. L. Guan, and Y. Li, “Capacity-achievingiterative LMMSE detection for MIMO-NOMA systems,” IEEE Trans.Signal Process., vol. 67, no. 7, pp. 1758–1773, Apr. 2019.

[25] K. Li and X. Wang, “EXIT chart analysis of turbo multiuser detection,”IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 300–311, Jan. 2005.

[26] G. Song and J. Cheng, “Low-complexity coding scheme to approachmultiple-access channel capacity,” in Proc. IEEE Int. Symp. Inf. Theory,Jun. 2015, pp. 2106–2110.

[27] X. Wang, S. Cammerer, and S. T. Brink, “Near Gaussian multiple accesschannel capacity detection and decoding,” in Proc. IEEE Int. Symp.Turbo Codes Iterative Inf. Process., Dec. 2018, pp. 1–5.

[28] R. Zhang, L. Xu, S. Chen, and L. Hanzo, “EXIT-Chart-aided hybridmultiuser detector for multicarrier interleave-division multiple access,”IEEE Trans. Veh. Technol., vol. 59, no. 3, pp. 1563–1567, Mar. 2010.

[29] K. Li, X. Wang, and L. Ping, “Analysis and optimization of interleave-division multiple-access communication systems,” IEEE Trans. WirelessCommun., vol. 6, no. 5, pp. 1973–1983, May 2007.

[30] K. Kusume, G. Bauch, and W. Utschick, “IDMA vs. CDMA: Analysisand comparison of two multiple access schemes,” IEEE Trans. WirelessCommun., vol. 11, no. 1, pp. 78–87, Jan. 2012.

[31] J. Song and Y. Shu, “On construction of rate-compatible raptor-like QC-LDPC code for enhanced IDMA in 5G and beyond,” in Proc. 10th Int.Symp. Turbo Codes, Dec. 2018, pp. 1–5.

[32] P. Hammarberg, F. Rusek, and O. Edfors, “Channel estimation algo-rithms for OFDM-IDMA: Complexity and performance,” IEEE Trans.Wireless Commun., vol. 11, no. 5, pp. 1722–1732, May 2012.

[33] T. Yang, J. Yuan, and Z. Shi, “Rate optimization for IDMA systems withiterative joint multi-user decoding,” IEEE Trans. Wireless Commun.,vol. 8, no. 3, pp. 1148–1153, Mar. 2009.

[34] Y. Zhang, K. Peng, and J. Song, “Enhanced IDMA with rate-compatibleraptor-like quasi-cyclic LDPC code for 5G,” in Proc. IEEE GlobecomWorkshops (GC Wkshps), Dec. 2017, pp. 1–6.

[35] Transmitter Side Signal Processing Schemes for NOMA, docu-ment R1-1804396 3GPP TSG RAN WG1 Meeting # 92, Samsung,Sanya, China, Apr. 2018.

[36] LLS Results for RDMA, GOCA, RSMA and IDMA Schemes, docu-ment R1-167536 3GPP TSG RAN WG1 Meeting # 86, MediaTek,Gothenburg, Sweden, Aug. 2016.

[37] Y. Chen and T. Wild, “Exploring performance and complexity ofselected NOMA candidates in 5G new radio,” in Proc. IEEE GlobecomWorkshops (GC Wkshps), Dec. 2018, pp. 1–6.

[38] C. Novak, G. Matz, and F. Hlawatsch, “IDMA for the multiuser MIMO-OFDM uplink: A factor graph framework for joint data detection andchannel estimation,” IEEE Trans. Signal Process., vol. 61, no. 16,pp. 4051–4066, Aug. 2013.

[39] T. Peng, Y. Xiao, X. He, and S. Li, “Improved detection of uplinkOFDM-IDMA signals with carrier frequency offsets,” IEEE Commun.Lett., vol. 16, no. 5, pp. 646–649, May 2012.

[40] F. Lenkeit, C. Bockelmann, D. Wübben, and A. Dekorsy, “IRAcode design for IDMA-based multi-pair bidirectional relaying sys-tems,” in Proc. IEEE Globecom Workshops (GC Wkshps), Dec. 2013,pp. 241–246.

[41] D. Guo, S. Shamai (Shitz), and S. Verdu, “Mutual information andminimum mean-square error in Gaussian channels,” IEEE Trans. Inf.Theory, vol. 51, no. 4, pp. 1261–1282, Apr. 2005.

[42] X. Yuan, L. Ping, C. Xu, and A. Kavcic, “Achievable rates of MIMOsystems with linear precoding and iterative LMMSE detection,” IEEETrans. Inf. Theory, vol. 60, no. 11, pp. 7073–7089, Nov. 2014.

[43] P. Hoeher and T. Wo, “Superposition modulation: Myths and facts,”IEEE Commun. Mag., vol. 49, no. 12, pp. 110–116, Dec. 2011.

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.

Page 15: Achievable Rate Region for Iterative Multi-User Detection ...liping/Research/Journal... · Achievable Rate Region for Iterative Multi-User Detection via Low-Cost Gaussian Approximation

WANG et al.: ACHIEVABLE RATE REGION FOR ITERATIVE MUD VIA LOW-COST GAUSSIAN APPROXIMATION 3303

[44] S. T. Brink, “Convergence behavior of iteratively decoded parallel con-catenated codes,” IEEE Trans. Commun., vol. 49, no. 10, pp. 1727–1737,Oct. 2001.

[45] L. Ping, J. Tong, X. Yuan, and Q. Guo, “Superposition coded modulationand iterative linear MMSE detection,” IEEE J. Sel. Areas Commun.,vol. 27, no. 6, pp. 995–1004, Aug. 2009.

[46] T. Yang and J. Yuan, “Performance of iterative decoding for superposi-tion modulation-based cooperative transmission,” IEEE Trans. WirelessCommun., vol. 9, no. 1, pp. 51–59, Jan. 2010.

[47] P. A. Hoeher, H. Schoeneich, and J. C. Fricke, “Multi-layer interleave-division multiple access: Theory and practice,” Eur. Trans. Telecomm.,vol. 19, no. 5, pp. 523–536, Aug. 2008.

[48] S. T. Brink, G. Kramer, and A. Ashikhmin, “Design of low-densityparity-check codes for modulation and detection,” IEEE Trans. Com-mun., vol. 52, no. 4, pp. 670–678, Apr. 2004.

[49] D. Guo, Y. Wu, S. Shamai (Shitz), and S. Verdú, “Estimation in Gaussiannoise: Properties of the minimum mean-square error,” IEEE Trans. Inf.Theory, vol. 57, no. 4, pp. 2371–2385, Apr. 2011.

[50] S.-Y. Chung, G. Forney, T. Richardson, and R. Urbanke, “On the designof low-density parity-check codes within 0.0045 dB of the Shannonlimit,” IEEE Commun. Lett., vol. 5, no. 2, pp. 58–60, Feb. 2001.

[51] X. Yuan, Q. Guo, X. Wang, and L. Ping, “Evolution analysis of low-cost iterative equalization in coded linear systems with cyclic prefixes,”IEEE J. Sel. Areas Commun., vol. 26, no. 2, pp. 301–310, Feb. 2008.

[52] S. Sharifi, A. K. Tanc, and T. M. Duman, “LDPC code design forthe two-user Gaussian multiple access channel,” IEEE Trans. WirelessCommun., vol. 15, no. 4, pp. 2833–2844, Apr. 2016.

[53] A. Balatsoukas-Stimming and A. P. Liavas, “Design of LDPC codes forthe unequal power two-user Gaussian multiple access channel,” IEEEWireless Commun. Lett., vol. 7, no. 5, pp. 868–871, Oct. 2018.

[54] Y. Chi, L. Liu, G. Song, C. Yuen, Y. L. Guan, and Y. Li, “Prac-tical MIMO-NOMA: Low complexity and capacity-approaching solu-tion,” IEEE Trans. Wireless Commun., vol. 17, no. 9, pp. 6251–6264,Sep. 2018.

[55] G. Song and J. Cheng, “Distance enumerator analysis for interleave-division multi-user codes,” IEEE Trans. Inf. Theory, vol. 62, no. 7,pp. 4039–4053, Jul. 2016.

[56] X. Yuan, “Low-complexity iterative detection coded linear Syst,”Ph.D. dissertation, City Univ. Hong Kong, Hong Kong, 2008.

[57] R. Y. S. Tee, R. G. Maunder, and L. Hanzo, “EXIT-chart aided near-capacity irregular bit-interleaved coded modulation design,” IEEE Trans.Wireless Commun., vol. 8, no. 1, pp. 32–37, Jan. 2009.

[58] S.-Y. Chung, T. Richardson, and R. Urbanke, “Analysis of sum-product decoding of low-density parity-check codes using a Gaussianapproximation,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 657–670,Feb. 2001.

[59] J. A. McGowan and R. C. Williamson, “Loop removal from LDPCcodes,” in Proc. IEEE Inf. Theory Workshop (ITW), Apr. 2003,pp. 230–233.

[60] X.-Y. Hu, E. Eleftheriou, and D. Arnold, “Regular and irregular pro-gressive edge-growth tanner graphs,” IEEE Trans. Inf. Theory, vol. 51,no. 1, pp. 386–398, Jan. 2005.

[61] G. Liva, S. Song, L. Lan, Y. Zhang, S. Lin, and W. E. Ryan, “Designof LDPC codes: A survey and new results,” J. Commun. Softw. Syst.,vol. 2, no. 3, pp. 191–211, Sep. 2006.

[62] I. Andriyanova and J.-P. Tillich, “Designing a good low-rate sparse-graph code,” IEEE Trans. Commun., vol. 60, no. 11, pp. 3181–3190,Nov. 2012.

[63] G. Yue, L. Ping, and X. Wang, “Generalized low-density parity-checkcodes based on Hadamard constraints,” IEEE Trans. Inf. Theory, vol. 53,no. 3, pp. 1058–1079, Mar. 2007.

Xiaojie Wang (Student Member, IEEE) receivedthe B.Sc. and M.Sc. degrees (Hons.) in electri-cal engineering from the University of Stuttgart,Germany, in 2012 and 2014, respectively, where heis currently pursuing the Ph.D. degree. He is workingas a Research Staff with the Institute of Telecom-munications, University of Stuttgart. His researchinterests include multiuser detection/multiple accesstechniques, advanced waveform, and air interfacedesign and estimation/detection theory.

Chulong Liang received the B.E. degree in com-munication engineering and the Ph.D. degree incommunication and information systems from SunYat-sen University, Guangzhou, China, in 2010 and2015, respectively. He was a Post-Doctoral Fel-low with the Department of Electronic Engineering,City University of Hong Kong, from July 2015 toJune 2018, and a Research Fellow with the Depart-ment of Electronic Engineering, City University ofHong Kong, from June 2018 to May 2019. His cur-rent research interest includes channel coding theoryand its applications to communication systems.

Li Ping (Fellow, IEEE) received the Ph.D. degreefrom Glasgow University in 1990. He was a Lec-turer with the Department of Electronic Engineering,Melbourne University, from 1990 to 1992, and amember of research staff with the Telecom AustraliaResearch Laboratories from 1993 to 1995. He hasbeen with the Department of Electronic Engineering,City University of Hong Kong, since 1996, wherehe is currently the Chair Professor. He served asa member of the Board of Governors of the IEEEInformation Theory Society from 2010 to 2012.

He received the British Telecom-Royal Society Fellowship in 1986, the IEEJ. J. Thomson premium in 1993, the Croucher Foundation Award in 2005, andthe British Royal Academy of Engineering Distinguished Visiting Fellowshipin 2010.

Stephan ten Brink (Senior Member, IEEE) hasbeen a faculty member with the University ofStuttgart, Germany, since July 2013, where he is cur-rently the Head of the Institute of Telecommunica-tions. From 1995 to 1997 and 2000 to 2003, he waswith the Bell Laboratories, Holmdel, NJ, USA, con-ducting research on multiple antenna systems. FromJuly 2003 to March 2010, he was with Realtek Semi-conductor Corporation, Irvine, CA, as the Director ofthe Wireless ASIC Department, developing WLANand UWB single chip MAC/PHY CMOS solutions.

In April 2010, he returned to the Bell Laboratories as a Department Headof the Wireless Physical Layer Research Department, Stuttgart, Germany.He was a recipient and co-recipient of several awards, including the VodafoneInnovation Award, the IEEE Stephen O. Rice Paper Prize, and the IEEECommunications Society Leonard G. Abraham Prize for contributions tochannel coding and signal detection for multiple-antenna systems. He is thebest known for his work on iterative decoding (EXIT charts) and MIMOcommunications (soft sphere detection and massive MIMO).

Authorized licensed use limited to: CITY UNIV OF HONG KONG. Downloaded on June 10,2020 at 04:53:47 UTC from IEEE Xplore. Restrictions apply.


Recommended