Вернуться к поискуВернуться к таблице

 Выделить слова:


 
Патент США N 7899138
Bang ,   et al. March 1, 2011

Method of detecting space-time code in mobile communication system with 4 Tx antenna

РЕФЕРАТ

The present invention relates to a method of detecting a space-time code in a mobile communication system. When detecting a space-time code B for a plurality of transmitting antennas, an ML (maximum likelihood) metric, which is generally calculated by using a specific structure of a matrix B, is defined as a new ML metric by reducing a variable of the ML metric. Two dependent sphere decoding processes are performed and an intersection of the decoding results is calculated, and a signal is detected from the ML metric. Therefore, since detection of the space-time code B for the plurality of transmitting antennas is performed by using the newly defined ML metric, an amount of matrix calculated can be reduced, and a calculation amount can be reduced by performing the two dependent sphere changed according to a channel situation, it is possible to improve the performance of the system.


Автор(ы): Bang; Young-Jo (Daejeon, KR), Yu; Chang-Wahn (Daejeon, KR), Bahng; Seung-Jae (Daejeon, KR), Kim; Dae-Ho (Daejeon, KR), Park; Youn-Ok (Daejeon, KR), Ahn; Jee-Hwan (Daejeon, KR), Kim; II Min (Suwon-si, KR)
Заявитель: Samsung Electronics Co. Ltd (Suwon-si, KR)
Family ID: 39498011
N заявки: 11/930,013
Приоритет: October 30, 2007

Foreign Application Priority Data

Dec 07, 2006 [KR] 10-2006-0123915

Current U.S. Class: 375/340 ; 375/347
Класс МПК: H04L 27/06 (20060101); H03D 1/00 (20060101)
Current CPC Class: H04L 1/0631 (20130101); H04L 25/03242 (20130101)
Field of Search: 375/259-260,267,346-347,349,340-342


Ссылки на источники [Referenced By]

Патентные документы США
7190734 March 2007 Giannakis et al.
7443928 October 2008 Nefedov et al.
7469014 December 2008 Abe et al.
7489746 February 2009 Awater et al.
7583723 September 2009 Heikkila
7676007 March 2010 Choi et al.
2006/0050804 March 2006 Leclair
2007/0136648 June 2007 Kwon et al.
Зарубежные патентные документы
10-2004-0019296 Mar., 2004 KR
10-2006-0039015 May., 2006 KR
1020060043724 May., 2006 KR
10-0651036 Nov., 2006 KR
10-2007-0059659 Jun., 2007 KR
2007066935 Jun., 2007 WO

Другие ссылки

Zongkai Yang, Chao Liu and Jianhua He, "A New Approach for Fast Generalized Sphere Decoding in MIMO System", IEEE Signal Processing Letters, vol. 12, No. 1, pp. 41-44, Jan. 2006. cited by other .
Mohamed Oussama Damen, Karim Abed-Meraim and Jean-Claude Belfiore, "Generalized Sphere Decoder for Asymmetrical Space-time Communication Architecture", IEEE Electronic Letters, vol. 36, beginning at p. 166, Jan. 2000. cited by other .
Pranav Dayal and Mahesh K. Varanasi, "A Fast Generalized Sphere Decoder for Optimum Decoding of Under-determined MIMO Systems," Proc. 41st Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, pp. 1216-1225, Oct. 2003. cited by other.

Primary Examiner: Corrielus; Jean B
Attorney, Agent or Firm: Jefferson IP Law, LLP

ФОРМУЛА ИЗОБРЕТЕНИЯ



What is claimed is:

1. A method of detecting a space-time code for a plurality of transmitting antennas, the method comprising: receiving, by at least one receiving antenna, signals that are and a second symbol group each of which includes a pair of a first symbol and a second symbol, each symbol including imaginary and real parts each having one or more bits; calculating a ML (maximum likelihood) metric for the first symbol group if detection on the first symbol group is determined according to the channel statuses; performing sphere decoding on the calculated ML metric and sequentially detecting an imaginary part of one bit and a real part of one bit for the first symbol and the second symbol of the first symbol group; and detecting, by a detector, the second symbol group as a single symbol on the basis of the detected first symbol group.

2. The method of claim 1, wherein the ML metric is calculated by an intersection of results that are obtained by performing two sphere decoding schemes.

3. The method of claim 2, wherein the ML metric is restricted to be smaller than a constant that is defined in advance.

4. The method of claim 3, wherein, when one receiving antenna exists, the ML metric is calculated using the received signals and channel gains between the plurality of transmitting antennas and the receiving antenna.

5. The method of claim 4, wherein, when a plurality of receiving antennas exist, the ML metric is calculated using the received signals in the plurality of receiving antennas and channel gains between the plurality of transmitting antennas and the plurality of receiving antennas.

6. The method of claim 1, wherein the second symbol group is detected by a single symbol detection method.

7. The method of claim 6, wherein the single symbol detection method is an Alamouti decoding scheme.

9. The method of claim 8, wherein the imaginary part of the second symbol is estimated using the following equations: .times..times..function..function..times..times..times..times..times..tim- es..function..function..times..times..times..times..times..function..times- ..times..function..times..times..times..times. ##EQU00029##

10. The method of claim 1, wherein the ML metric is calculated by performing Cholesky decomposition on the first symbol group or the second symbol group.

11. The method of claim 10, further comprising detecting the second symbol group as a single symbol and updating a variable of the radius of a sphere decoder that becomes a criterion when detecting the space-time code.

12. The method of claim 11, wherein, if each of detected values for the first symbol group and the second symbol group is larger than the radius of the sphere decoder, it is informed that there is no constellation in the variable of the radius of the sphere decoder.

This application claims priority to and the benefit of Korean Patent Application No. 10-2006-0123915 filed in the Korean Intellectual Property Office on Dec. 7, 2006, the entire contents of which are incorporated herein by reference.

BACKGROUND OF THE INVENTION

(a) Field of the Invention

The present invention relates to a mobile communication system, and more particularly, to a method of detecting a space-time code.

(b) Description of the Related Art

In general, WiBro, which is a field of a mobile communication system, means a portable Internet system that has two meanings of "wireless" and "wideband". A Wibro system has been defined as a system that satisfies the standard established by IEEE 802.16 and five performance criteria, by the Ministry of Information and Communication on Jul. 29, 2004. Here, the five performance criteria include that {circumflex over (1)} when a mobile terminal moves at a speed of 60 km/h, a data transmission rate of at least 512 kbps during a downlink and a data transmission rate of at least 128 kbps during an uplink are ensured at cell interfaces, {circumflex over (2)} a channel bandwidth is 9 MHz or more, {circumflex over (3)} a roaming process of communication equipment needs to be performed between service providers, {circumflex over (4)} a frequency reuse coefficient is 1, and {circumflex over (5)} a TDD method is used to minimize interference between frequencies, while transmitting/receiving time slots synchronize with each other.

In the IEEE 802.16e, when there are four transmitting antennas in a system, three usable space-time codes are defined. The three space-time codes are represented by three matrices A, B, and C, respectively, and each space-time code has a different symbol transmission rate and diversity gain. Among them, particularly, the space-time code B has a superior trade-off performance for the symbol transmission rate and the diversity gain, as follows.

.times..times..times..times..times..times..times..times. ##EQU00001##

In this case, the vertical axis indicates an antenna. It can be understood that four symbols are simultaneously transmitted from four antennas. The horizontal axis indicates time or a carrier frequency.

When symbols are transmitted by using the given space-time code, the symbols are simultaneously received by a receiving terminal. Thus, the entire performance of a system depends on an efficient detection method in the receiving terminal. Among detection methods that have been proposed in the related art, a maximum likelihood (ML) detection method is most superior in terms of performance.

However, the ML detection method is very complicated. In particular, in the case of when a magnitude of a constellation increases (e.g., in the case of 16-QAM or 64-QAM), since complexity of the system is increased, it is not possible to perform the ML detection in real time. signals, complexity is alleviated as compared with the case of the simple ML detection method according to the related art.

However, when considering a downlink, the size of a mobile terminal is generally restricted. Therefore, it is difficult for a plurality of receiving antennas to be located at one mobile terminal. Actually, in the WiBro system, even though two or more receiving antennas are defined in one mobile terminal, a plurality of mobile terminals have a number of receiving antennas that is smaller than a number of transmitting terminals.

In particular, a scheme that is entitled "A new approach for fast generalized sphere decoding in MIMO systems" that was proposed by Z. Yang, C. Liu and J. He and disclosed in IEEE Signal Processing Letters, has been known as the fastest sphere decoding scheme when the number of receiving antennas is smaller than the number of transmitting antennas. However, as in the WiBro system, in the case where four transmitting antennas exist and the magnitude of the constellation is large, an algorithm is very complex. As a result, it is difficult to use the scheme in the system.

Examples of a method of reducing the complexity of a system and providing suboptimal performance include ZF (Zero-Forcing), MMSE (Minimum Mean Squared Error), SIC (ZF with Successive Interference Cancellation), MMSE with SIC, and the like. However, since these methods cannot provide the ML performance, they are inferior to the sphere decoding scheme that can ensure the ML performance.

The above information disclosed in this Background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not form the prior art that is already known in this country to a person of ordinary skill in the art.

SUMMARY OF THE INVENTION

The present invention has been made in an effort to provide a method of detecting a space-time code, having advantages of detecting the space-time code in a mobile communication system where a plurality of transmitting antennas are provided.

An exemplary embodiment of the present invention provides a method of detecting a space-time code for a plurality of transmitting antennas. The method includes receiving signals transmitted from the plurality of transmitting antennas and first symbol and a second symbol, each symbol including imaginary and real parts each having one or more bits; calculating an ML (maximum likelihood) metric for the first symbol group if a detection on the first symbol group is determined according to the channel statuses; performing sphere decoding on the calculated ML metric and sequentially detecting an imaginary part of one bit and a real part of one bit for the first symbol and the second symbol of the first symbol group; and detecting the second symbol group as a single symbol on the basis of the detected first symbol group.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram illustrating a system according to an exemplary embodiment of the present invention.

FIG. 2 is a flowchart illustrating a detection method according to an exemplary embodiment of the present invention.

FIG. 3 is an exemplary view illustrating comparison results between running times in a 4-QAM method according to an exemplary embodiment of the present invention and a method according to the related art.

FIG. 4 is an exemplary view illustrating comparison results between CPU clocks in a 4-QAM method according to an exemplary embodiment of the present invention and a method according to the related art.

FIG. 5 is an exemplary view illustrating comparison results between running times in a 16-QAM method according to an exemplary embodiment of the present invention and a method according to the related art.

FIG. 6 is an exemplary view illustrating comparison results between CPU clocks in a 16-QAM method according to an exemplary embodiment of the present invention and a method according to the related art.

DETAILED DESCRIPTION OF THE EMBODIMENTS

In the following detailed description, only certain exemplary embodiments of the present invention have been shown and described, simply by way of illustration. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature and not restrictive. Like reference numerals designate like elements throughout the specification.

In addition, unless explicitly described to the contrary, the word "comprise" and variations such as "comprises" or "comprising" will be understood to imply the inclusion of stated elements but not the exclusion of any other elements.

Before describing an exemplary embodiment of the present invention, an assumption about a space-time code B will be described.

A space-time code B is composed of a 4.times.4 matrix. But symbols that are completely different from symbols that are transmitted in first and second columns are transmitted in third and fourth columns, and a receiving terminal receives a space-time code at a different time slot or frequency. Thus, it is assumed that space-time codes are generated only in consideration of the first and second columns, as represented by Equation 1.

.times..times..times..times. ##EQU00002##

On the assumption, a space-time codes detecting system according to an exemplary embodiment of the present invention will be described with reference to FIG. 1.

FIG. 1 is a schematic diagram illustrating a wireless communication system according to an exemplary embodiment of the present invention.

As shown in FIG. 1, the wireless communication system comprises a transmitter with 4 transmitting antenna and a receiver with n.sub.R receiving antenna. The receiver has a detector.

In an exemplary embodiment of the present invention, a case that the number of receiving antennas is one will be described, then a case that the number of receiving antennas is n.sub.R will be described.

In case that one receiving antenna exists in a receiver, signals that are received in first and second time slots in the receiver are represented by Equation 2. r1=h.sub.1x.sub.1+h.sub.2x.sub.2+h.sub.3x.sub.3+h.sub.4x.sub.4+n.sub.1 r2=-h.sub.1x.sub.2*+h.sub.2x.sub.1*-h.sub.3x.sub.4*+h.sub.4x.sub.3*+n.sub- .2 (Equation 2)

In this case, h.sub.j indicates a channel gain between a j-th transmitting antenna and a receiving antenna. In addition, n.sub.i indicates white noise in an i-th time slot. In this case, ML (maximum likelihood) detection is performed as represented by Equation 3.

.times..times..times..times..times..times..times..times..times..times..di- -elect cons..times..times..times. ##EQU00003##

In this case, S indicates a constellation, and an ML metric is given by Equation 4. M=|r.sub.1-h.sub.1x.sub.1-h.sub.2x.sub.2-h.sub.3x.sub.3-h.sub.4x.sub.4|.s- up.2+|r.sub.2+h.sub.1x.sub.2*-h.sub.2x.sub.1*+h.sub.3x.sub.4*-h.sub.4x.sub- .3*|.sup.2 (Equation 4)

From Equation 4, the ML metric can be represented in Equation 5, which is an equation that is newly derived according to the exemplary embodiment of the present invention. In Equation 5, a matrix operation can be briefly performed by reducing the number of variables that are included in respective terms at the right side. M=.parallel..alpha..sub.0-D.sub.AX.sub.A.parallel..sup.2+.parallel..beta.- 0-D.sub.BX.sub.B.parallel..sup.2 (Equation 5)

A variety of vectors and matrices in Equation 5 are defined as follows.

.alpha..function..alpha..function..alpha. ##EQU00004## .beta..function..beta..function..beta. ##EQU00004.2## .function..alpha..function..alpha..times..function..alpha..function..alph- a..times..function..alpha..function..alpha..function..alpha..times..functi- on..alpha..times..function..alpha..times..function..alpha..times..function- ..alpha..times..function..alpha. ##EQU00004.3## .function..beta..function..beta..times..function..beta..function..beta..t- imes..function..beta..function..beta..function..beta..times..function..bet- a..times..function..beta..times..function..beta..times..function..beta..ti- mes..function..beta. ##EQU00004.4## .function..function..function..function..function..function..times..alpha- ..times..times..alpha..times..times..alpha..alpha..times..times..alpha..al- pha..times..times..times..times..alpha..function..function..function..func- tion..function..function..times..beta..alpha..beta..times..times..beta..be- ta..times..times..beta..beta..times..times..beta. ##EQU00004.5##

Further, the ML metric of Equation 5 can be represented by Equation 6. M=.parallel.F.sub.A(.rho..sub.A-X.sub.A).parallel..sup.2+.parallel.F.sub.- B(.rho..sub.B-X.sub.B).parallel..sup.2 (Equation 6)

In this case, the conditions .rho..sub.A=D.sub.A.sup.T(D.sub.AD.sub.A.sup.T).sup.-1.alpha..sub.0 and .rho..sub.B=D.sub.B.sup.T(D.sub.BD.sub.B.sup.T).sup.-1.beta..sub.0 are satisfied.

Further, the two matrices F.sub.A and F.sub.B are obtained by applying the normalized Cholesky decomposition to the two matrices G.sub.A=(D.sub.A).sup.TD.sub.A and G.sub.B=(D.sub.B).sup.TD.sub.B. Further, Equation 6 can be represented as Equation 7.

.times..times..times..function..rho..times..times..times..rho..times..tim- es..times..function..rho..times..times..function..rho..times..times..times- ..function..rho..times..times..function..rho..times..times. ##EQU00005##

Here, .rho..sub.j.sup.A indicates the j-th element of .rho..sub.A and F.sub.ij.sup.A indicates the (i, j)-th element of F.sub.A. In this way, .rho..sub.j.sup.B and F.sub.ij.sup.B are defined.

.times..times..function..rho..ltoreq..times..times..times..times..functio- n..rho..ltoreq..times..times. ##EQU00006##

In the exemplary embodiment of the present invention, two dependent sphere decoding numerical formulas exist. In the exemplary embodiment of the present invention, it is assumed that x.sub.3 and x.sub.4 are detected and then x1 and x2 are detected. Further, it is assumed that each symbol has a 4-PSK constellation. That is, each symbol may have any one of four values of {1, -1, j, -j}.

Thus, each of x.sup.A.sub.j and x.sup.B.sub.j has a value of either +1 or -1. A sphere decoding scheme that is represented by Equation 8 will now be described.

.times..times..times..rho..ltoreq..times..times..times..ltoreq..times..ti- mes..times..rho..times..times. ##EQU00007##

If solving Equation 1 by applying a method that has been proposed by Z. Yang, x.sup.A.sub.6 can be estimated as represented by Equation 11. x.sub.6.sup.A.epsilon.{-1,1}.andgate.[LB.sub.6.sup.A,UB.sub.6.sup.A] (Equation 11)

However, when F.sup.A.sub.2,6 is a positive number,

.times..times..times..times..times..times..times. ##EQU00008## .times..times. ##EQU00008.2##

Further, when F.sup.A.sub.2,6 is a negative number,

.times..times. ##EQU00009## .times..times..times..times..times. ##EQU00009.2##

In the same method, if solving Equation 9, the condition for x.sup.B.sub.6 can be obtained as follows. x.sub.6.sup.A=x.sub.6.sup.BI|x.sub.4|

Thus, the condition for an imaginary part of x.sub.4 is given by Equation 12. I[x.sub.4].epsilon.{-1,1}.andgate.[max(LB.sub.6.sup.A,LB.sub.6.sup.B)- ,min(UB.sub.6.sup.A,UB.sub.6.sup.B)] (Equation 12)

If repeating the above-described method, the condition for x.sup.B.sub.6 can be obtained as follows. X.sub.5.sup.A.epsilon.{-1,1}.andgate.[LB.sub.5.sup.A,UB.sub.5.sup.A]

When F.sup.A.sub.2,5 is a positive number,

.times..times..times..times..times..times..times..times..times. ##EQU00010## .times..times..times..times..times..times. ##EQU00010.2##

When F.sup.A.sub.2,5 is a negative number,

.times..times..times..times. ##EQU00011## .times..times..times..times..times..times..times..times..times. ##EQU00011.2##

In the same method, if calculating Equation 9, the condition for x.sup.B.sub.5 can be obtained, and the condition for a real part of x.sub.4 is given by Equation 13, similar to Equation 12. [x.sub.4].epsilon.{-1,1}.andgate.[max(LB.sub.5.sup.A,LB.sub.5.sup.B),min(- UB.sub.5.sup.A,UB.sub.5.sup.B)] (Equation 13)

In this way, the conditions for imaginary and real parts of x.sub.3 can be obtained as represented by Equations 14 and 15. I[x.sub.3].epsilon.{-1,1}.andgate.[max(LB.sub.4.sup.A,LB.sub.4.sup.B),min- (UB.sub.4.sup.A,UB.sub.4.sup.B)] (Equation 14) [x.sub.3].epsilon.{-1,1}.andgate.[max(LB.sub.3.sup.A,LB.sub.3.sup.B),min(- UB.sub.3.sup.A,UB.sub.3.sup.B)] (Equation 15) Equation 16. x.sub.3= [x.sub.3]+j I[x.sub.3] x.sub.4= [x.sub.4]+j I[x.sub.4] (Equation 16)

As described above, after detecting x.sub.3 and x.sub.4, x.sub.1 and x.sub.2 are detected as follows. In the exemplary embodiment of the present invention, different from a general method, an Alamouti decoding scheme instead of the sphere decoding scheme is applied to two remaining symbols.

First, if substituting the estimated values for x.sub.3 and x.sub.4 given by Equation 16 for Equation 2, Equation 17 is obtained. {tilde over (r)}.sub.1=h.sub.1x.sub.1+h.sub.2x.sub.2+n.sub.1 {tilde over (r)}2=-h.sub.1x.sub.2*+h.sub.2x.sub.1*+n.sub.2 {tilde over (r)}.sub.1=r.sub.1-h.sub.3 x.sub.3-h.sub.4 x.sub.4 {tilde over (r)}.sub.2=r.sub.2+h.sub.3 x.sub.4*-h.sub.4 x.sub.4. (Equation 17)

Equation 17 shows a received signal in the case where an Alamouti decoding scheme is applied once. Thus, extremely simple detection can be performed, and the results that are obtained by detecting x.sub.1 and x.sub.2 are as follows.

.times..function..times..times..function..times..times..times..times..tim- es..times..times..times..times..times. ##EQU00012##

In Equation 18, the sign means a signum function.

From Equation 18, the estimated values for real and imaginary parts of x.sub.1 and x.sub.2 can be simply calculated as follows. |x.sub.1|=[ x.sub.1] I[x.sub.1]=I[ x.sub.1] [x.sub.2]=[ x.sub.2] I[x.sub.1]=I[ x.sub.1] (Equation 19) calculated above, C' is calculated as represented by Equation 20. C'=.parallel..alpha..sub.0-D.sub.A X.sub.A.parallel..sup.2+.parallel..beta..sub.0-D.sub.B X.sub.B.parallel..sup.2 (Equation 20)

If the condition C'>C is satisfied, it means that there is no constellation point in a given radius C, like the existing sphere coding scheme. Thus, the C value is increased by a predetermined method. However, if the condition C'<C is satisfied, a constellation point exists.

Thus, first, Equation 7 is restricted to be smaller than or equal to the constant C. As a result, the two necessary conditions are derived. Then, the constant C is converted into the constant C'. The above-described processes are repeated until the constellation point is not discovered. In this case, the finally discovered constellation point becomes an ML estimated value.

The description has been given on the assumption that the number of receiving antennas is one. The description will be made on the assumption that n.sub.r receiving antennas exist. First, the ML metric, which has been represented by Equation 5, is represented by Equation 21.

.times..alpha..fwdarw..fwdarw..times..beta..fwdarw..fwdarw..times..times.- .times..times..times..times..times..alpha..fwdarw..function..alpha..functi- on..alpha..times..function..alpha..function..alpha..times..times..times..b- eta..fwdarw..function..beta..function..beta..times..function..beta..functi- on..beta..times..times..fwdarw..function..alpha..function..alpha..times..f- unction..alpha..function..alpha..times..function..alpha..function..alpha..- function..alpha..times..function..alpha..times..function..alpha..times..fu- nction..alpha..times..function..alpha..times..function..alpha..function..a- lpha..times..function..alpha..times..times..function..alpha..times..functi- on..alpha..times..times..function..alpha..times..function..alpha..times..f- unction..alpha..times..times..function..alpha..times..times..function..alp- ha..times..times..function..alpha..times..times..function..alpha..times..t- imes..function..alpha..times..times..times..fwdarw..function..beta..functi- on..beta..times..function..beta..function..beta..times..function..beta..fu- nction..beta..function..beta..times..function..beta..times..function..beta- ..times..function..beta..times..function..beta..times..function..beta..fun- ction..beta..times..function..beta..times..times..function..beta..times..f- unction..beta..times..times..function..beta..times..function..beta..times.- .function..beta..times..times..function..beta..times..times..function..bet- a..times..times..function..beta..times..times..function..beta..times..time- s..function..beta..times..times..times..times..alpha..times..times..times.- .alpha..times..times..alpha..times..times..times..alpha..times..times..alp- ha..times..times..times..alpha..times..times..alpha..times..times..times..- beta..alpha..times..times..times..beta..times..times..beta..times..times..- times..beta..times..times..beta..times..times..times..beta..times..times..- beta..times..times. ##EQU00013##

and k indicates an index of a receiving antenna.

In this case, if a constant Z is defined as Z=min(2n.sub.r, 6), the ML metric is given as follows.

.times..times..times..function..rho..times..times..times..rho..times..tim- es..times..function..rho..times..times..function..rho..times..times..times- ..function..rho..times..times..times..function..rho..times..times..functio- n..rho. ##EQU00014##

If the given numerical formula is solved by the above-described method, XAj(j=3, 4, 5, and 6) is estimated as represented by Equation 22. x.sub.j.sup.A.epsilon.{-1,1}.andgate.[LB.sub.j.sup.A,UB.sub.j.sup.A] j=3,4,5,6 (Equation 22)

If F.sup.A.sub.Zj is a positive number,

.times..times..times..times..times..times..times..times. ##EQU00015## .times..times..times..times..times..times..times. ##EQU00015.2##

If F.sup.A.sub.Zj is a negative number,

.times..times. ##EQU00016## .times..times..times..times. ##EQU00016.2##

In the same method, X.sup.B.sub.j (j=3, 4, 5, and 6) is estimated, and estimate values for imaginary and real parts of x.sub.3 and x.sub.4 can be calculated by using Equations 12 to 15. The following processes are the same as those in the case in which one receiving antenna exists.

The description has been given to the case of 4-QAM. However, the result that is obtained above can be generalized to the case of arbitrary M-QAM. First, for better comprehension and ease of description, a case of 16-QAM is exemplified. In this case, as a value of each of x.sup.A.sub.j and x.sup.B.sub.j, any one of {-3, -1, 1, 3} is selected.

First, if estimating x.sup.A.sub.j, the following conversion is performed as proposed by Z. Yang, C. Liu, and J. He. If a value of F.sup.A.sub.2,j is a positive number, with respect to x.sup.A.sub.j corresponding to j, the following conversion is performed.

##EQU00017##

If a value of F.sup.A.sub.2,j is a negative number, with respect to x.sup.A.sub.j corresponding to j, the following conversion is performed.

##EQU00018##

If representing the value of x.sup.A.sub.j in a form of a binary number, it is as follows. b.sub.j.sup.A=2b.sub.1j.sup.A+b.sub.0j.sup.A b.sub.ij.sup.A.epsilon.{0,1}

If using the numerical formula, an estimated value for x.sup.A.sub.j can be calculated as follows.

.di-elect cons..times..times..times..times..times..times. ##EQU00019##

In this way, an estimated value for b.sup.B.sub.j can be calculated as follows.

.di-elect cons..times..times..times..times..times..times. ##EQU00020##

If F.sup.A.sub.2,6 and F.sup.B.sub.2,6 have the same code, X.sup.A.sub.6 and X.sup.B.sub.6 have the same value. As a result, b.sup.A.sub.6 and b.sup.B.sub.6 have the same value. Thus, the conditions b.sup.A.sub.0,6=b.sup.B.sub.0,6 and b.sup.A.sub.1,6=b.sup.B.sub.1,6 are satisfied.

However, if F.sup.A.sub.2,6 and F.sup.B.sub.2,6 have different codes, respectively, the conditions b.sup.A.sub.0,6=b.sup.B.sub.0,6 and b.sup.A.sub.1,6=b.sup.B.sub.1,6 are not satisfied. For example, when it is assumed that F.sup.A.sub.2,6 is a positive number and F.sup.B.sub.2,6 is a negative number, the following numerical formula is satisfied.

##EQU00021##

Here, any one of {0, 1, 2, 3} is selected as a value of each of the constants b.sup.A.sub.6 and b.sup.B.sub.6. Accordingly, b.sup.B.sub.6 can be considered as a complement of 1 with respect to b.sup.A.sub.6. Thus, using b.sup.A.sub.0,6 and b.sup.B.sub.0,6, b.sub.0,6 can be estimated as represented by Equation 23.

.times..times..function..function..times..times..times..times. ##EQU00022##

In this case, a dot .cndot. indicates a complement of 1.

In the same method, b.sub.0,6 can be estimated as follows.

.times..times..function..function..times..times..times..times. ##EQU00023##

In Equation 24,

.di-elect cons..times..times..times..times..times..times..times..times..t- imes. ##EQU00024##

If F.sup.A.sub.2,6 and F.sup.B.sub.2,6 have the same code,

.di-elect cons..times..times..times..times..times..times..times..times..t- imes. ##EQU00025##

If F.sup.A.sub.2,6 and F.sup.B.sub.2,6 have different codes, respectively, in a numerical formula for b.sup.B.sub.1,6, the value of b.sub.0,6 needs to be changed to a complement of 1. An imaginary part for X.sub.4 is estimated as represented by Equation 25. I[x4]=sign(F.sub.2,6.sup.A)(2(2 b.sub.1,6+ b.sub.0,6)-3) (Equation 25)

In the same method, a real part of X.sub.4 and imaginary and real parts of X.sub.3 can be estimated. That is, imaginary and real parts of X.sub.4 and imaginary and real parts of X.sub.3 are sequentially estimated. At this time, imaginary and constellation.

The case of 16-QAM has been described. The case of M-QAM will now be described.

In the case of M-QAM, as a value of each of X.sup.A.sub.j and X.sup.B.sub.j, any one of {-- {square root over (M)}+1, - {square root over (M)}+3, . . . , -1, 1, . . . , {square root over (M)}-3, {square root over (M)}-1} is selected. In this case, if a value of F.sup.A.sub.2,j is a positive number, a conversion like Equation 26 is performed on X.sup.A.sub.J that corresponds to j.

.times..times. ##EQU00026##

If a value of F.sup.A.sub.2j is a negative number, a conversion like Equation 27 is performed on X.sup.A.sub.j that corresponds to j.

.times..times. ##EQU00027##

A detection method, which is executed after the conversion is performed, is the same as the method that is described in the 16-QAM. which x.sub.3 and x.sub.4 pass is superior to a channel through which x.sub.1 and x.sub.2 pass, superior performance is obtained. However, when the channel through which x.sub.3 and x.sub.4 pass is inferior to the channel through which x.sub.1 and x.sub.2 pass, superior performance cannot be obtained due to error propagation.

In this case, after estimating x.sub.1 and x.sub.2, x.sub.3 and x.sub.4 are estimated. In general, when Equation 28 is satisfied, x.sub.1 and x.sub.2 are first estimated. When Equation 28 is not satisfied, x.sub.3 and x.sub.4 are first estimated.

.times..gtoreq..times..times..times. ##EQU00028##

The detection method will now be described in detail with reference to FIG. 2.

FIG. 2 is a flowchart illustrating a detection method according to an exemplary embodiment of the present invention.

As shown in FIG. 2, if receiving signals from n.sub.r receiving antennas (Step S100), it is determined which channel is superior from among a plurality of channels through which the signals are received (Step S110). In the exemplary embodiment of the present invention, since the detection of the signals from four antennas is exemplified, it is determined whether a channel from transmitting antennas 3 and 4 is superior to a channel from transmitting antennas 1 and 2. the ML metric that is generated for the purpose of performing sphere decoding (Step S120). In this case, since the Cholesky decomposition is already well-known, a detailed description thereof will be omitted in the exemplary embodiment of the present invention.

If the ML metric is calculated by performing the Cholesky decomposition, x.sub.3 and c.sub.4 are detected by using two dependent sphere decoders (Step S130). Since the method of detecting x.sub.3 and c.sub.4 by using the sphere decoders is already well-known, a detailed description thereof will be omitted in the exemplary embodiment of the present invention.

If x.sub.3 and c.sub.4 are detected, x.sub.1 and x.sub.2 are detected by a single symbol detection method using Equation 17 (Step S140). When detecting x.sub.1 and x.sub.2, an Alamouti decoding scheme is used.

Steps S120 to S140 are performed when the channel from the transmitting antennas 3 and 4 is superior to the channel from the transmitting antennas 1 and 2. Meanwhile, when the channel from the transmitting antennas 1 and 2 is superior to the channel from the transmitting antennas 3 and 4, after Cholesky decomposition is performed (Step S160), x.sub.1 and x.sub.2 are detected by using a sphere decoder (Step S170) and x.sub.3 and x.sub.4 are then detected by using the single symbol detection method (Step S180).

As described above, after x.sub.1, x.sub.2, x.sub.3 and x.sub.4 are all detected, the radius of a sphere decoder is updated (Step S150). The detection method is repeatedly performed until only one constellation point exists in the updated radius of the sphere decoder.

Referring to FIGS. 3 to 6, the running times and the CPU clocks when using the 4-QAM method and the 16-QAM method according to the exemplary embodiment of the present invention are compared with the running time and the CPU clock when using the method according to the related art.

FIGS. 3 and 4 are exemplary views illustrating the comparison result between a running time and the number of CPU clocks when using a 4-QAM method according to an exemplary embodiment of the present invention and a running time and the number of CPU clocks when using a method according to the related art.

In this case, the scheme, which is proposed by Z. Yang, C. Liu, and J. He, is called a "best known scheme". FIG. 3 shows a comparison result between running times when using a detection method according to an exemplary embodiment of the present invention and when using the detection method according to the best known scheme. As shown in FIG. 3, it can be understood that the running time when using the detection method according to the exemplary embodiment of the present invention is shorter than the running time when using the detection method according to the best known scheme. In particular, an improvement width is large in a region having a low SNR (signal-to-noise ratio).

As shown in FIG. 4, it can be understood that the number of CPU clocks when using the 4-QAM method according to the exemplary embodiment of the present invention is smaller than the number of CPU clocks when using the method according to the best known scheme. In this case, the number of CPU clocks is in proportion to complexity of a system. When the number of CPU clocks increases, the complexity of the system increases.

FIGS. 5 and 6 are exemplary views illustrating a comparison result between a running time and the number of CPU clocks when using a 16-QAM method according to an exemplary embodiment of the present invention and a running time and the number of CPU clocks when using a method according to the related art.

As shown in FIGS. 5 and 6, it can be understood that the detection method according to the exemplary embodiment of the present invention using the 16-QAM method is superior to the detection method according to the related art in terms of the running time and the number of CPU clocks. This point is the same as that of the 4-QAM method.

In this case, a program that realizes a function corresponding to the structure according to the exemplary embodiment of the present invention and a recording medium that has the program recorded therein are within the range of the present invention.

While this invention has been described in connection with what is presently considered to be practical exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

According to the above-described exemplary embodiment, when detecting the space-time code B for the four transmitting antennas, as compared with the case of using the existing sphere decoding scheme, it is possible to provide the same ML performance with low complexity.

* * * * *