Loading [MathJax]/extensions/MathZoom.js
Compressed Sensing Improves the Performance of Subcarrier Index-Modulation-Assisted OFDM | IEEE Journals & Magazine | IEEE Xplore

Compressed Sensing Improves the Performance of Subcarrier Index-Modulation-Assisted OFDM


Fig. 1 illustrates the underlying concepts of the proposed compressed sensing assisted index modulation (CSIM) scheme and iterative residual check (IRC) detector. In our ...

Abstract:

In orthogonal frequency division multiplexing relying on subcarrier index modulation (OFDM-SIM), the information is conveyed by both the indices of the activated subcarri...Show More

Abstract:

In orthogonal frequency division multiplexing relying on subcarrier index modulation (OFDM-SIM), the information is conveyed by both the indices of the activated subcarriers and the conventional amplitude-phase modulated (APM) symbols. It has been shown that OFDM-SIM is capable of striking a tradeoff between the attainable spectral efficiency (SE) and energy efficiency (EE). In order to further increase the EE of the OFDM-SIM system, while potentially increasing its SE, we propose a compressed sensing (CS)-assisted signaling strategy for the family of OFDM-SIM systems. Correspondingly, we first consider the joint maximum likelihood detection of the CS-assisted index-modulated (CSIM) and of the classic APM symbols, despite its high complexity. Then, we propose a low complexity detection algorithm, which is termed as the iterative residual check (IRC)-based detector. This is based on the greedy pursuit concept of CS, which makes locally optimal choices at each step. Finally, both analytical and simulation results are provided for characterizing the attainable system performance of our proposed OFDM-CSIM system. We demonstrate that in comparison to the conventional OFDM-SIM system, the proposed OFDM-CSIM arrangement is capable of achieving both a higher SE as well as an increased EE. We also show that the diversity gain provided by the OFDM-CSIM system is much higher than that of the OFDM-SIM system. Furthermore, our investigation of the detection performance shows that the proposed IRC detector is capable of providing an attractive detection performance at a low complexity.
Fig. 1 illustrates the underlying concepts of the proposed compressed sensing assisted index modulation (CSIM) scheme and iterative residual check (IRC) detector. In our ...
Published in: IEEE Access ( Volume: 4)
Page(s): 7859 - 7873
Date of Publication: 05 October 2016
Electronic ISSN: 2169-3536

Funding Agency:


CCBY - IEEE is not the copyright holder of this material. Please follow the instructions via https://creativecommons.org/licenses/by/4.0/ to obtain full-text articles and stipulations in the API documentation.

Notations

AbbreviationExpansion
$(\cdot )^{T}$ and $(\cdot )^{\ast }$

the transpose and the conjugate, respectively

$(\cdot )^{H}$ and $(\cdot )^{-1}$

the conjugate transpose and the inverse, respectively

$\mathbb {E}[\cdot ]$

the expectation operator

$\mathbb {Z}_{+}^{N}$

a set of real integers containing {1,2,…,N}

$\mathbb {C}^{M\times L}$

the set of $(M\times L)$ -element matrices in the complex field

$\pmb {x}$ and $\pmb {X}$

vector in boldface lower-case and matrix in boldface upper-case, respectively

$\pmb {x}(l)$ and $x(m,l)$

$l$ th block of symbols and $m$ th symbol of $l$ th block, respectively

$\pmb {I}_{M}$

the $(M\times M)$ -element identity matrix

$\pmb {I}_{i}$

the $(M\times M_{i})$ -element mapping matrix whose columns are extracted from the $\pmb {I}_{M}$ according to an index set $\mathcal {I}_{i}$

$\pmb {\mathcal {F}}_{M}$

the normalized $(M\times M)$ -element DFT matrix, which satisfies $\pmb {\mathcal {F}}_{M}\pmb {\mathcal {F}}_{M}^{H}=\pmb {\mathcal {F}}_{M}^{H}\pmb {\mathcal {F}}_{M}=\pmb {I}_{M}$

$diag\{\pmb {x}\}$

the diagonal matrix with elements in $\pmb {x}$ on its diagonal

$\|\pmb {x}\|_{p}$

the $\ell _{p}$ -norm of a vector $\pmb {x}$ , where $p>0$

$\|\pmb {x}\|_{0}$

the pseudo-$\ell _{0}$ -norm of a vector $\pmb {x}$ , which is defined as $\|\pmb {x}\|_{0}=Card(Supp(\pmb {x}))$

$\{A\}\backslash \{B\}$

the difference of two sets $\{A\}$ and $\{B\}$

SECTION I.

Introduction

Recently, a paradigm shift took place from the development of spectrally efficient communication techniques to the conception of both spectral- and energy-efficient communication techniques, as detailed in [1]–​[6]. Indeed, as pointed out in [1], striking a compelling compromise between the spectral efficiency (SE) (or the bandwidth efficiency) and energy efficiency (EE) (or the power efficiency) is essential for the design state-of-the-art networks. Hence, various joint SE and EE solutions have been proposed for the different protocol layers [4], [6]. Specifically, in the physical layer, more and more attention is paid to the SE and EE of communications systems, including both the digital signal processing and the analog front-end.

As the predominant transmission technique of broadband communications, at the time of writing [7], [8], orthogonal frequency-division multiplexing (OFDM) is mainly characterized by its high degree of flexibility and high spectral efficiency [9]. Generally, a frequency-selective fading channel can be converted into a number of parallel flat-fading subchannels with the aid of OFDM, thereby, considerably reducing the receiver’s complexity as a benefit of using single-tap frequency-domain (FD) equalization. Moreover, cyclic prefix (CP)-based OFDM can be employed for avoiding inter-OFDM-symbol interference. Recently, OFDM has been combined with index modulation (OFDM-IM) [10]–​[12]. In [10] and [11], the subcarrier IM (SIM) concept has been proposed based on a principle reminiscent of the implicit information conveyed by the activated antenna index in spatial modulation (SM) based multiple-input-multiple-output (MIMO) systems [2]. Then, a generalized IM scheme has been proposed and analyzed in [12]. Further details on the historical timeline of the SIM can be found in [13].

The most appealing aspect of SIM is its flexibility in terms of striking a tradeoff between the SE and EE, as analyzed in [14] and [15]. Hence, SIM has the potential of representing a win-win alternative in scenarios, such as device-to-device (D2D) communications, in-vechicle communications [16], sensor networks, etc. However, since it is an emerging technique, there are also some open issues. Apart from the above-mentioned SE and EE aspects of SIM, we will also consider the associated diversity and complexity issues, which will also be addressed in this paper. Generally, the most powerful contributor to reliable communications over mutipath propagation channels is diversity, including temporal diversity, frequency diversity and space diversity, as detailed in [17]. As demonstrated in [12] and [13], OFDM-SIM systems are capable of outperforming the classic OFDM systems for a low throughput. In [18], a block interleaver has been employed for achieving a beneficial time diversity gain. Later in [19], the coordinate interleaved orthogonal design (CIOD) of [20] has been employed in OFDM-SIM systems for improving the attainable transmitter diversity gain. However, the attainable multipath diversity gain has not been fully exploited by these schemes and no generalized analytical results are available for the achievable diversity order of the OFDM-SIM system. The complexity of SIM has to be separately considered at the transmitter and receiver side. In [21], a generalized look-up table has been proposed in order to improve the SE of SIM. However, in light of the limited SE improvement, the implementation complexity imposed may be deemed excessive. At the receiver side, since the information is conveyed in both the amplitude-phase modulated (APM) symbols and the SIM symbols, it is quite a challenge to design a detection scheme, which provides a good detection performance at a low complexity. In [12], the joint maximum likelihood (JML) detector has been conceived. As a further development, based on the fact that the FD symbols are either zero valued or non-zero valued, the authors of [12] have proposed a log-likelihood ratio (LLR) based detector, which has been shown to have the same detection performance as the JML detector, but at a lower complexity cost. Later, the JML and the LLR detectors have been modified in [19].

On the other hand, compressed sensing (CS), as an emerging theory, has attracted considerable research-attention. Initially, CS has been proposed for recovering vectors in high dimensions from vectors in low dimensions, as detailed in [22]. Then, it has been invoked for solving numerous problems in communications systems, such as channel estimation [23], narrowband interference mitigation [24], spectrum sensing [25], impulsive noise mitigation [26] and so on. However, to the best of the authors’ knowledge, CS has not been applied to the family of OFDM-SIM systems. Specifically, when an OFDM-SIM system is designed for aforementioned EE communications scenarios, the number of activated subcarriers should be small. By taking advantage of this condition, each group of subcarriers can be potentially represented by a sparse vector. Hence, according to CS, it is also possible to detect (or recover) the corresponding sparse vector with the aid of algorithms such as the family of $\ell _{1}$ -minimization algorithms [27]–​[29] and Greedy pursuit algorithms [30]–​[32].

To address the aforementioned issues, our contributions of this paper are summarized as follows.

  • We propose a CS-assisted signalling strategy for OFDM-SIM systems. The general philosophy of our proposed CS-assisted IM (CSIM) scheme transpires from Fig. 1. The basic idea of CSIM is that the conventional IM is implemented in a high-dimensional virtual digital-domain, and then the high-dimensional IM symbols are compressed into the low-dimensional subcarriers in the FD with the aid of CS. In this way, both the SE and EE of our proposed CSIM becomes higher than that of conventional SIM.

  • We provide both analytical and simulation results for characterizing the system performance of the OFDM-CSIM system. We first demonstrate that the attainable SE of the proposed OFDM-CSIM system is higher than that of the conventional OFDM-SIM system. Moreover, for a given SE, our OFDM-CSIM system is capable of achieving higher EE than the conventional OFDM-SIM system.

  • We characterize the attainable diversity gain of both the conventional SIM and of our proposed CSIM schemes by both analytical and simulation results. Our investigations demonstrate that the OFDM-CSIM system is capable of achieving the maximum attainable multipath diversity order, which is verified by our simulation results.

  • We first invoke the JML detector for the OFDM-CSIM system for the sake of performance comparison. Since the complexity of the JML detector may be deemed excessive in practice, we propose a low-complexity detector, namely the iterative residual check (IRC) detector, for our system. As depicted in Fig. 1, the IRC detector is proposed based on the Greedy Pursuit concept of CS [33], which updates its estimates one step at a time by making locally optimal choices at each step. We demonstrate that an attractive detection performance can be attained by the IRC detector using as few as one or two iterations, yielding a low complexity.

FIGURE 1. - Illustration of the relationships between compressed sensing (CS), subcarrier index modulation (SIM), CS-assisted index modulation (CSIM) as well as our iterative residual check (IRC) detector.
FIGURE 1.

Illustration of the relationships between compressed sensing (CS), subcarrier index modulation (SIM), CS-assisted index modulation (CSIM) as well as our iterative residual check (IRC) detector.

The rest of the paper is organized as follows. In Section II, both our system model and the proposed CSIM signalling are detailed. Then, both the JML detector and the proposed IRC detector are described in Section III. In Section IV, the performance of the proposed system is analyzed. Our simulation results are discussed in Section V. Finally, we offer our conclusions in Section VI.

SECTION II.

System Model

A. Description of Transmitter

We assume a multicarrier system employing $M$ subcarriers. The $M$ subcarriers are divided into $G$ groups, each of which contains $m=M\slash G$ subcarriers. Our proposed system is illustrated in Fig. 2. An $L_{\text {b}}$ -length sequence of i.i.d. data bits is first split into $G$ groups, each of which contains $L=L_{\text {b}}\slash G=L_{1}+L_{2}$ bits. In each group, $L_{1}$ bits are mapped into an index symbol according to an index mapper $\mu _{1}$ : $\{0,1\}^{L_{1}}\to \mathcal {Z}$ , where $\mathcal {Z}=\{\mathcal {Z}_{1},\ldots ,\mathcal {Z}_{C}\}$ contains $C=2^{L_{1}}$ index subsets, each of which is formed with the aid of $K$ indices chosen from $N$ available indices, as shown in [12]. Thereby, we have $L_{1}=\log _{2} C=\left \lfloor{ \log _{2} {\binom{N}{ {K}}}}\right \rfloor $ . Let the $c$ th index subset of $\mathcal {Z}$ be denoted as $\mathcal {Z}_{c}=\{\mathcal {Z}_{c}(0),\ldots ,\mathcal {Z}_{c}(K-1)\}\subset \mathcal {Z}$ , where $\mathcal {Z}_{c}(k)\in \mathbb {Z}_{+}^{N}$ for $k=0,\ldots ,K-1$ . Let us assume that the $g$ th group of data bits is mapped into the $c$ th candidate in $\mathcal {Z}$ . Then, for the sake of simplicity, let the $g$ th group of the index symbols be denoted as $\mathcal {I}_{g}=\mathcal {Z}_{c}\subset \mathcal {Z}$ . On the other hand, the remaining $L_{2}$ bits are mapped onto $K$ classic APM symbols according to a rotated $Q$ -ary QAM/PSK constellation with alphabet $\mathcal {A}_{\phi }\triangleq \{a_{1},\ldots ,a_{Q}: a_{q}=xe^{j\phi }, x\in \mathcal {A}\}$ , where $\phi $ denotes the rotated angle and $\mathcal {A}$ is the alphabet of the QAM/PSK scheme. Note that an appropriately rotated constellation scheme is invoked for ensuring that the signal space diversity is increased at no cost in terms of either power or bandwidth [34]. Specifically, let us denote the data symbols to be transmitted associated with the $g$ th group as $\pmb {x}_{\text {d},g}=[x_{\text {d},g}(0),\ldots ,x_{\text {d},g}(K-1)]^{T}$ , where we assume that $\mathbb {E}[ |x_{\text {d},g}(k)|^{2}]=1$ , $\forall {x_{\text {d},g}(k)\in \mathcal {A}_{\phi }}$ . Then, in order to further increase the attainable diversity gain, the CIOD of [20] is invoked for transforming $\pmb {x}_{\text {d},g}$ into $\pmb {x}_{\text {CI},g}$ , which can be expressed as \begin{equation} \pmb {x}_{\text {CI},g}=f_{\text {CI}}\left \{{\pmb {x}_{\text {d},g}}\right \}, \end{equation} View SourceRight-click on figure for MathML and additional features. where $x_{\text {CI},g}(k)=\Re \{x_{\text {d},g}(k)\}+j\Im \{x_{\text {d},g}((k+K\slash 2)\bmod {K})\}$ for $k=0,\ldots ,K-1$ . Next, as illustrated in Fig. 3, the $K$ data symbols in $\pmb {x}_{\text {CI},g}$ are respectively assigned to the $K$ active subcarrier indices in $\mathcal {I}_{g}$ , yielding a block of virtual domain symbols $\pmb {x}_{g}=[x_{g}(0),x_{g}(1),\ldots ,x_{g}(N-1)]^{T}$ , which can be expressed as \begin{equation} \pmb {x}_{g}=\pmb {I}_{g}\pmb {x}_{\text {CI},g}, \end{equation} View SourceRight-click on figure for MathML and additional features. where $\pmb {I}_{g}$ is a $(N\times K)$ -element mapping matrix obtained from an $(N\times N)$ -element identity matrix by choosing the columns having the column indices given by the indices in $\mathcal {I}_{g}$ . Based on the above discussion, we can readily show that the symbol vector of (2) conveys \begin{equation} L=L_{1}+L_{2}=\left \lfloor{ \log _{2} {\binom{N}{ {K}}}}\right \rfloor +K\log _{2} Q \end{equation} View SourceRight-click on figure for MathML and additional features. data bits by each of the $G$ groups. The total number of bits per symbol is $GL$ . From (2), we can define a vector space $\mathcal {V}$ for the digital virtual domain as $\mathcal {V}\triangleq \{\pmb {v}_{1},\ldots ,\pmb {v}_{2^{L}}\}$ , which is composed by all the legitimate versions of $N$ -dimensional $\pmb {x}_{g}$ vectors with any $\mathcal {I}_{g}\subset \mathcal {Z}$ and $\pmb {x}_{\text {d},g}\in \mathcal {A}_{\phi }^{K}$ . From another perspective, we can see that the $g$ th group of $L$ data bits is directly mapped into a symbol vector $\pmb {x}_{g}\in \mathcal {V}$ . Hence, the vector space $\mathcal {V}$ contains a total of $2^{L}$ candidates, as it is defined. Here, the signalling relying on SIM using CI proposed in [19] is shown. Note that, when the CI is not used, the symbol vector $\pmb {x}_{\text {CI},g}$ in (2) can be replaced by $\pmb {x}_{\text {d},g}$ , representing the conventional SIM of [12], which invokes SIM without any effort to obtain a diversity gain.

FIGURE 2. - Illustration of the OFDM-CSIM system employing CI and a depth-
$G$
 interleaver 
$\Pi $
.
FIGURE 2.

Illustration of the OFDM-CSIM system employing CI and a depth-$G$ interleaver $\Pi $ .

FIGURE 3. - Illustration of the CSIM scheme. The dimension 
$N$
 of virtual digital domain is higher than the dimension 
$m$
 of FD, i.e., we have 
$N>m$
. The shaded box represents the activated index, while the blank box represents the in-activated index.
FIGURE 3.

Illustration of the CSIM scheme. The dimension $N$ of virtual digital domain is higher than the dimension $m$ of FD, i.e., we have $N>m$ . The shaded box represents the activated index, while the blank box represents the in-activated index.

As shown in Fig. 3, a measurement matrix $\pmb {A}\in \mathbb {C}^{m\times N}$ is employed for compressing the $N$ -dimensional vector $\pmb {x}_{g}$ in the virtual digital domain into an $m$ -dimensional vector $\pmb {s}_{g}$ in the FD, which can be expressed as \begin{equation} \pmb {s}_{g}=\pmb {A}\pmb {x}_{g}, \end{equation} View SourceRight-click on figure for MathML and additional features. where each column of $\pmb {A}$ is assumed to be of unity length to yield $\mathbb {E}[\|\pmb {s}_{g}\|_{2}^{2}]=K$ . As illustrated in Fig. 3, the dimension of the symbol vector $\pmb {x}_{g}$ is designed to be much higher than that of the subcarrier symbol vector $\pmb {s}_{g}$ to be transmitted in each group. By contrast, in the conventional SIM scheme, both these dimensions are the same, i.e., we have $m=N$ . Clearly, more data bits can be transmitted by our proposed CSIM scheme than by the conventional SIM scheme, for fixed values of $m,K,Q$ . For example, let $m=8$ , $N=1024$ , $K=2$ and $Q=2$ , which results in 0.75 bits-per-channel-use for the conventional SIM scheme, while for our CSIM scheme, it can be readily shown that we have 2.5 bits-per-channel-use at no cost in terms of either power or bandwidth. Furthermore, when the symbol vector $\pmb {x}_{g}$ is designed for satisfying $K\ll N$ , $\pmb {x}_{g}$ is a sparse vector associated with a sparsity level of $K$ . In this case, Eq. (4) represents a classical mathematic modelling of CS [22], whose recovery performance (or detection performance in our scenario) is determined by the specific characteristics of the measurement matrix $\pmb {A}$ , as it will be detailed in Section III.

Next, as seen in Fig. 2, in order to achieve multipath diversity, the $G$ groups of compressed symbols denoted as $\pmb {S}=[\pmb {s}_{1}, \pmb {s}_{2},\ldots ,\pmb {s}_{G}]\in \mathbb {C}^{m\times G}$ are fed into a depth-$G$ interleaver $\Pi $ , yielding the interleaved FD symbols expressed as $\pmb {s}_{\text {F}}=[s_{\text {F}}(0),s_{\text {F}}(1),\ldots ,s_{\text {F}}(M-1)]^{T}$ , where we have $M=mG$ . Here, as shown in [18], the depth-$G$ interleaver $\Pi $ permutes $\pmb {S}$ by reading column-by-column and then writing row-by-row, which can be expressed as $\pmb {s}_{\text {F}}=\sum \limits _{g=1}^{G}\pmb {I}_{\Pi _{g}}\pmb {s}_{g}$ , where $\pmb {I}_{\Pi _{g}}$ is the $(M\times m)$ -element mapping matrix based on the depth-$G$ interleaver $\Pi $ for the $g$ th group characterized by $s_{g}(i)=s_{\text {F}}(g-1+iG)$ for $g=1,\ldots ,G$ and $i=0,1\ldots ,m-1$ . Furthermore, we can also show that $\pmb {I}_{\Pi _{g}}^{T}\pmb {I}_{\Pi _{g}}=\pmb {I}_{m}$ and $\pmb {I}_{\Pi _{g}}^{T}\pmb {I}_{\Pi _{g^{'}}}=\pmb {0}$ for $g^{'}\neq g$ , which can be used for characterizing the de-interleaving process of $\Pi ^{-1}$ , as it will be detailed in Section II-B. Then, as shown in Fig. 2, the FD symbols in $\pmb {s}_{\text {F}}$ are input to the $M$ -point IFFT, yielding the time-domain (TD) symbols $\pmb {s}_{\text {T}}=\pmb {\mathcal {F}}_{M}^{H}\pmb {s}_{\text {F}}$ . Finally, after adding a CP of length $L_{\text {cp}}$ , the transmitted baseband symbols can be expressed as $\pmb {s}_{\text {cp}}=\pmb {I}_{\text {CP}}^{T}\pmb {s}_{\text {T}}$ , where $\pmb {I}_{\text {CP}}=[\pmb {I}_{\text {cp}}, \pmb {I}_{M}]$ and $\pmb {I}_{\text {cp}}$ is a $(M\times L_{\text {cp}})$ -element mapping matrix obtained from the last $L_{\text {cp}}$ columns of an identity matrix $\pmb {I}_{M}$ .

B. Received Signals

We assume an $L_{\text {h}}$ -tap frequency-selective Rayleigh fading channel, which has a channel impulse response (CIR) of $\pmb {h}_{\text {T}}=[h_{\text {T}}(0),h_{\text {T}}(1),\ldots ,h_{\text {T}}(L_{\text {h}}-1)]^{T}$ , where we have $h_{\text {T}}(l)\sim \mathcal {CN}(0,1\slash L_{\text {h}})$ . We assume that $L_{\text {cp}}\geq L_{\text {h}}$ and that perfect synchronization is achieved at the receiver. Furthermore, the bandwidth of each subchannel is assumed to be much lower than the channel’s coherence bandwidth. Then, as shown in Fig. 2, after removing the CP, the received baseband equivalent observations $\pmb {y}_{\text {T}}=[y_{\text {T}}(0),y_{\text {T}}(1),\ldots ,y_{\text {T}}(M-1)]^{T}$ can be formulated as \begin{equation} \pmb {y}_{\text {T}}=\pmb {H}_{\text {cir}}\pmb {s}_{\text {T}}+\pmb {w}_{\text {T}}, \end{equation} View SourceRight-click on figure for MathML and additional features. where $\pmb {H}_{\text {cir}}$ is an $(M\times M)$ -element circulant matrix, which can be diagonalized by the DFT operations, giving $\pmb {H}_{\text {cir}}=\pmb {\mathcal {F}}_{M}^{H}\pmb {H}\pmb {\mathcal {F}}_{M}$ , where $\pmb {H}=diag\{\sqrt {M}\pmb {\mathcal {F}}_{M}\pmb {I}_{\text {h}}\pmb {h}_{\text {T}}\}$ with $\pmb {I}_{\text {h}}$ being a $(M\times L_{\text {h}})$ -element mapping matrix formed by the first $L_{\text {h}}$ columns of an identity matrix $\pmb {I}_{M}$ . In (5), $\pmb {w}_{\text {T}}$ is the additive white Gaussian noise (AWGN) with a mean of zero and a variance of $N_{0}$ . As shown in Fig. 2, after the FFT operation and de-interleaving, the $g$ th group of received FD symbols can be expressed as \begin{align*} \pmb {y}_{g}=&\pmb {I}_{\Pi _{g}}^{T}\left ({ \pmb {\mathcal {F}}_{M} \pmb {y}_{\text {T}}}\right ) \\=&\pmb {I}_{\Pi _{g}}^{T}\left ({ \pmb {H}\pmb {s}_{\text {F}}+\pmb {\mathcal {F}}_{M}\pmb {w}_{\text {T}}}\right ) \\=&\pmb {I}_{\Pi _{g}}^{T}\pmb {H}\sum \limits _{g=1}^{G}\pmb {I}_{\Pi _{g}}\pmb {s}_{g}+\pmb {I}_{\Pi _{g}}^{T}\left ({\pmb {\mathcal {F}}_{M}\pmb {w}_{\text {T}}}\right )\tag{6a}\\=&\pmb {I}_{\Pi _{g}}^{T}\pmb {H}\pmb {I}_{\Pi _{g}}\pmb {s}_{g}+\bar {\pmb {w}}_{g}\tag{6b}\\=&\bar {\pmb {H}}_{g}\pmb {s}_{g}+\bar {\pmb {w}}_{g} \tag{6c}\end{align*} View SourceRight-click on figure for MathML and additional features. where by definition $\bar {\pmb {w}}_{g}=\pmb {I}_{\Pi _{g}}^{T}\left ({\pmb {\mathcal {F}}_{M}\pmb {w}_{\text {T}}}\right )$ contains the $g$ th group of de-interleaved FD noise samples. Note that, since $\pmb {H}$ is a diagonal matrix, we can readily show that $\pmb {I}_{\Pi _{g}}^{T}\pmb {H}\pmb {I}_{\Pi _{g^{'}}}=\pmb {0}$ for $g\neq g^{'}$ , which is applied in (6a) to obtain (6b). In (6c), the diagonal matrix $\bar {\pmb {H}}_{g}$ can be explicitly expressed as \begin{align*} \bar {\pmb {H}}_{g}=&\pmb {I}_{\Pi _{g}}^{T}\pmb {H}\pmb {I}_{\Pi _{g}} \\=&\pmb {I}_{\Pi _{g}}^{T}diag\left \{{\sqrt {M}\pmb {\mathcal {F}}_{M}\pmb {I}_{\text {h}}\pmb {h}_{\text {T}}}\right \}\pmb {I}_{\Pi _{g}} \\=&diag\left \{{ \sqrt {M}\pmb {I}_{\Pi _{g}}^{T}\pmb {\mathcal {F}}_{M}\pmb {I}_{\text {h}} \pmb {h}_{\text {T}}}\right \} \\=&diag\left \{{\pmb {F}_{\text {h},\Pi _{g}}\pmb {h}_{\text {T}}}\right \}=diag\{\bar {h}_{g}(0),\ldots ,\bar {h}_{g}(m-1)\} ,\qquad \tag{7}\end{align*} View SourceRight-click on figure for MathML and additional features. where by definition $\pmb {F}_{\text {h},\Pi _{g}}=\sqrt {M}\pmb {I}_{\Pi _{g}}^{T}\pmb {\mathcal {F}}_{M}\pmb {I}_{\text {h}}\in \mathbb {C}^{m\times L_{\text {h}}}$ . It can be shown that $\bar {h}_{g}(i)\sim \mathcal {CN}(0,1)$ and $\bar {w}_{g}(i)\sim \mathcal {CN}(0,N_{0})$ , $\forall {g,i}$ . Hence, we can observe from (6c) that $\pmb {y}_{g}$ having the complex Gaussian distribution having the conditioned probability density function (PDF) of \begin{equation*} p\left ({ \pmb {y}_{g} | \pmb {s}_{g}}\right )=\frac {1}{(\pi N_{0})^{m}}\exp \left \{{ -\frac {\|\pmb {y}_{g}-\bar {\pmb {H}}_{g}\pmb {s}_{g}\|_{2}^{2}}{N_{0}} }\right \}\!. \tag{8}\end{equation*} View SourceRight-click on figure for MathML and additional features. Then, as seen in Fig. 2, each group of the de-interleaved symbols is input into the detector discussed in Section III.

SECTION III.

Detection of the OFDM-CSIM Signals

In this section, we first consider the JML detector. Then, we propose an IRC detector for reducing the potentially excessive complexity of the JML detector. In our derivation, we stipulate the idealized simplifying assumption that perfect channel estimation is achieved at the receiver.

Firstly, upon substituting (4) into (6c), we arrive at \begin{equation*} \pmb {y}_{g}=\bar {\pmb {H}}_{g}\pmb {A}\pmb {x}_{g}+\bar {\pmb {w}}_{g}, \tag{9}\end{equation*} View SourceRight-click on figure for MathML and additional features. where the measurement matrix $\pmb {A}\in \mathbb {C}^{m\times N}$ is assumed to be a sub-matrix of an $(N\times N)$ -element orthonormal dictionary. According to [35] and [36], the measurement matrix $\pmb {A}$ should be designed for satisfying the mutual incoherence property (MIP)1 or the restricted isometry property (RIP).2 However, since computing the restricted isometry constant of the RIP has been shown to be NP-hard [37], the MIP is used in this paper. According to [35], the mutual coherence of $\pmb {A}$ should satisfy $\mu _{\pmb {A}}<1\slash (2K-1)$ , which is the sufficient condition of guaranteeing that there exists at most one $K$ -sparse vector $\pmb {x}_{g}$ such that $\pmb {A}\pmb {x}_{g}=\pmb {s}_{g}$ . Thus, in order to provide a guaranteed detection performance, the measurement matrix $\pmb {A}\in \mathbb {C}^{m\times N}$ is designed for satisfying \begin{equation*} \sqrt {\frac {N-m}{m(N-1)}}\leq \mu _{\pmb {A}}<\frac {1}{2K-1}, \tag{10}\end{equation*} View SourceRight-click on figure for MathML and additional features. where the lower bound at the left hand side is the well-known Welch bound [38]. Therefore, with the aid of (8) and (10), the PDF conditioned on $\pmb {x}_{g}$ can be expressed as \begin{equation*} p\left ({ \pmb {y}_{g} | \pmb {x}_{g}}\right )=\frac {1}{(\pi N_{0})^{m}}\exp \left \{{ -\frac {\|\pmb {y}_{g}-\bar {\pmb {H}}_{g}\pmb {A}\pmb {x}_{g}\|_{2}^{2}}{N_{0}} }\right \}\!. \tag{11}\end{equation*} View SourceRight-click on figure for MathML and additional features.

A. Joint Maximum Likelihood Detector

Typically, the optimum detector is the maximum a posteriori (MAP) detector, which solves the optimization problem of \begin{equation*} \pmb {x}_{g}^{\text {MAP}}=\underset {\pmb {v}_{i}\in \mathcal {V}}{ \arg \,\max } \left \{{p\left ({\pmb {v}_{i}|\pmb {y}_{g} }\right )}\right \}\!, \tag{12}\end{equation*} View SourceRight-click on figure for MathML and additional features. where $p\left ({\pmb {v}_{i}|\pmb {y}_{g} }\right )$ is the a posteriori probability of $\pmb {v}_{i}$ given the receiver’s output of $\pmb {y}_{g}$ . Let us assume that both the SIM symbols in $\mathcal {Z}$ and the classic APM symbols in $\mathcal {A}_{\phi }$ are equiprobable and independent. Then, the MAP detector of (12) becomes the ML detector, which can be described as \begin{equation*} \pmb {x}_{g}^{\text {ML}}=\underset {\pmb {v}_{i}\in \mathcal {V}}{\arg \min }\left \{{\left \|{\pmb {y}_{g}-\bar {\pmb {H}}_{g}\pmb {A}\pmb {v}_{i}}\right \|_{2}^{2}}\right \}\!. \tag{13}\end{equation*} View SourceRight-click on figure for MathML and additional features. Furthermore, according to (1) and (2), the ML detector of (13) is equivalent to the JML detector, which can be written as \begin{equation*} \left ({ \mathcal {I}_{g}^{\text {ML}} , \pmb {x}_{\text {d},g}^{\text {ML}}}\right )=\underset {\mathcal {Z}_{c}\subset \mathcal {Z},\pmb {a}\in \mathcal {A}_{\phi }^{K}}{\arg \min }\left \{{\left \|{\pmb {y}_{g}-\bar {\pmb {H}}_{g}\pmb {A}\pmb {I}_{c} f_{\text {CI}}\left \{{\pmb {a}}\right \}}\right \|_{2}^{2}}\right \}\!,\qquad \tag{14}\end{equation*} View SourceRight-click on figure for MathML and additional features. where $\pmb {I}_{c}$ is a mapping matrix based on $\mathcal {Z}_{c}$ , as seen in Section II-A. Explicitly, the JML detector of (14) has the complexity of $\mathcal {O}\left ({2^{L_{1}}Q^{K}}\right )$ , which may become excessive in practice, when the constellation size $Q$ is large and/or the dimensions of the measurement matrix $\pmb {A}\in \mathbb {C}^{m\times N}$ are high. In order to reduce the detection complexity and to glean benefits from employing the CS principles, below we propose a lower-complexity IRC detector.

B. Iterative Residual Check Detector

Let us first rewrite (9) as \begin{align*} \pmb {y}_{g}=&\pmb {\Phi }_{g}\pmb {x}_{g}+\bar {\pmb {w}}_{g}\tag{15a}\\=&\pmb {\Phi }_{g}\pmb {I}_{g}f_{\text {CI}}\{\pmb {x}_{\text {d},g}\}+\bar {\pmb {w}}_{g} \\=&\pmb {\Phi }_{g,\mathcal {I}_{g}}f_{\text {CI}}\{\pmb {x}_{\text {d},g}\}+\bar {\pmb {w}}_{g}, \tag{15b}\end{align*} View SourceRight-click on figure for MathML and additional features. where by definition we have $\pmb {\Phi }_{g}=\bar {\pmb {H}}_{g}\pmb {A}$ and $\pmb {\Phi }_{g,\mathcal {I}_{g}}=\pmb {\Phi }_{g}\pmb {I}_{g}$ . In (15a), the $N$ -dimensional symbol vector $\pmb {x}_{g}\in \mathcal {V}$ shown in Section II-A is exactly $K$ -sparse, which is observed in the spaces of $m$ dimensions. Hence, according to the CS principles, it can be recovered by solving the classic $\ell _{0}$ -minimization problem described in [39] and [40] as \begin{equation*} \pmb {x}_{g}^{\ell _{0}}=\underset {\pmb {v}\in \mathbb {C}^{N\times 1}}{ \arg \,\min } \|\pmb {v} \|_{0}, \quad \text {s.t.} ~\pmb {y}_{g}-\pmb {\Phi }_{g}\pmb {v} \in \mathcal {B}, \tag{16}\end{equation*} View SourceRight-click on figure for MathML and additional features. where $\mathcal {B}$ is a bounded set associated with the noise vector $\bar {\pmb {w}}_{g}$ , while $\pmb {v}$ is an $N$ -length testing vector chosen from the complex vector space $\mathbb {C}^{N\times 1}$ .

However, the $\ell _{0}$ -minimization problem of (16) has been shown to be NP-hard [41]. For this reason, typically the $\ell _{1}$ -minimization based solutions are employed in CS, since they are tractable to solve. Moreover, under the conditions shown in [22], the $\ell _{0}$ -minimization problem of (16) is equivalent to solving the $\ell _{1}$ -minimization problem of \begin{equation*} \pmb {x}_{g}^{\ell _{1}}=\underset {\pmb {v}\in \mathbb {C}^{N\times 1}}{ \arg \,\min } \|\pmb {v}\|_{1}, \quad \text {s.t.} ~ \pmb {y}_{g}-\pmb {\Phi }_{g}\pmb {v} \in \mathcal {B}. \tag{17}\end{equation*} View SourceRight-click on figure for MathML and additional features. Note that the $\ell _{1}$ -minimization problem is a well-known convex optimisation problem, which can be solved in polynomial time, for example, by the interior point method [42]. However, for our detection problem, the computational cost of solving the $\ell _{1}$ -minimization problem may still be excessive. Moreover, in the OFDM-CSIM system of Section II, the sparsity level $K$ of the symbol vector $\pmb {x}_{g}$ is determined by the number of activate indices, which is a fixed and known value. In this case, the lower-complexity family of greedy pursuit algorithms [30], [31] is preferred. However, the existing greedy algorithms can only provide relatively good detection performance, when the SNR is relatively high. Another concern is that for the existing greedy algorithms, the sparse estimation is operated without any restrictions on the signal space. Thus, the existing greedy algorithms cannot be directly invoked for detection in our scenario.

Based on the philosophy of greedy pursuits [33], which provides an approximated estimation via making locally optimal choices at each step, we propose a Greedy-like detector, namely the IRC detector, for detecting both the IM and the classic APM symbols in the sparse vector $\pmb {x}_{g}$ . The proposed IRC detector has the advantage of not only achieving a low detection complexity, but also guaranteeing a good detection performance even in the low to medium SNR regions. Our IRC detector is divided into two stages, an initialization stage and an iterative detection stage, as detailed below.

Firstly, at the initialization stage, the IRC detector invokes the minimum mean square error (MMSE) processing to obtain an $N$ -dimensional soft estimate of $\hat {\pmb {x}}_{g}\in \mathbb {C}^{N\times 1}$ for $\pmb {x}_{g}$ from the $m$ -dimensional observations $\pmb {y}_{g}$ seen in (15a), yielding \begin{equation*} \hat {\pmb {x}}_{g}=\left ({\pmb {\Phi }_{g}^{H}\pmb {\Phi }_{g}+\frac {1}{\gamma _{s}}\pmb {I}_{N}}\right )^{-1}\pmb {\Phi }_{g}^{H}\pmb {y}_{g}, \tag{18}\end{equation*} View SourceRight-click on figure for MathML and additional features. where $\gamma _{s}=\mathbb {E}[\|\pmb {s}_{\text {T}}\|_{2}^{2}]\slash \mathbb {E}[\|\pmb {w}_{\text {T}}\|_{2}^{2}]=K\slash (m N_{0})$ is the average SNR per symbol. In principle, the active elements in $\pmb {x}_{g}$ should generate relatively high magnitudes in $\hat {\pmb {x}}_{g}$ with high probability. Therefore, we order the elements in $\hat {\pmb {x}}_{g}$ in descending order according to their magnitudes as \begin{equation*} |\hat {x}_{g}(i_{1})|^{2}\geq |\hat {x}_{g}(i_{2})|^{2}\geq \ldots \geq |\hat {x}_{g}(i_{N})|^{2}, \tag{19}\end{equation*} View SourceRight-click on figure for MathML and additional features. which more or less reflects the reliabilities of the IM detection. Since the set $\{i_{1},i_{2},\ldots , i_{N}\}$ contains $K$ active indices and $(N-K)$ inactive indices, the leftmost $\hat {x}_{g}(i_{1})$ has the highest probability to be one of the active indices, while the rightmost $\hat {x}_{g}(i_{N})$ has the highest probability to be one of the inactive indices. With the aid of this information, the IRC detector then proceeds to the second stage, where both the IM and the classic APM symbols can be detected using the principle of greedy pursuits, as detailed next.

During the second stage, the IRC detector carries out iterative detection of both the IM symbols in $\mathcal {I}_{g}$ and the classic APM symbols in $\pmb {x}_{\text {d},g}$ by first identifying a candidate set, and then testing the candidates based on the likelihood principle of (14). In detail, during the first iteration, the IRC detector first derives a candidate set from the index $i_{1}$ of $\hat {x}_{g}(i_{1})$ , since it has the highest probability to be an active index. Let this candidate set be expressed as \begin{equation*} \mathcal {Z}^{1}=\{\mathcal {Z}_{1}^{1},\mathcal {Z}_{2}^{1},\ldots ,\mathcal {Z}_{C_{1}}^{1}\}\subset \mathcal {Z} \tag{20}\end{equation*} View SourceRight-click on figure for MathML and additional features. where $i_{1}$ is a member of each of the candidates, i.e., we have $\bigcap _{c_{1}=1}^{C_{1}}\mathcal {Z}_{c_{1}}^{1}=i_{1}$ . Here, we can readily show that the number of candidates in $\mathcal {Z}^{1}$ of (20) obeys $C_{1}\leq {\binom{N-1}{ {K-1}}}<C$ , where $C=2^{L_{1}}$ denotes the total number of subsets of $\mathcal {Z}$ , as shown in Section II-A. Then, for the candidate $\mathcal {Z}_{c_{1}}^{1}$ , we can obtain the Moore-Penrose pseudoinverse matrix \begin{align*} \pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}^{\dagger }=\left ({\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}^{H}\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}}\right )^{-1}\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}^{H}, \quad \mathcal {Z}_{c_{1}}^{1}\subset \mathcal {Z}^{1}\subset \mathcal {Z}, \\ \tag{21}\end{align*} View SourceRight-click on figure for MathML and additional features. where $\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}=\pmb {\Phi }_{g}\pmb {I}_{c_{1}}^{1}\in \mathbb {C}^{m\times K}$ is of full column-rank when $K<m$ , while $\pmb {I}_{c_{1}}^{1}$ is a $(N\times K)$ -element mapping matrix formed based on $\mathcal {Z}_{c_{1}}^{1}$ . Then, with the aid of (21) and (15b), we can form the estimation of the APM symbols as \begin{align*} \breve {\pmb {x}}_{\text {d},g}(c_{1})=&f_{\text {CI}}^{-1}\left \{{\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}^{\dagger }\pmb {y}_{g}}\right \} \\=&f_{\text {CI}}^{-1}\left \{{\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}^{\dagger }\pmb {\Phi }_{g,\mathcal {I}_{g}} f_{\text {CI}}\{\pmb {x}_{\text {d},g}\}+\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}^{\dagger }\bar {\pmb {w}}_{g}}\right \} \\=&\pmb {x}_{\text {d},g}+\pmb {r}_{\mathcal {I}_{g},\mathcal {Z}_{c_{1}}^{1}}+\breve {\pmb {w}}_{g}, \tag{22}\end{align*} View SourceRight-click on figure for MathML and additional features. where $\pmb {r}_{\mathcal {I}_{g},\mathcal {Z}_{c_{1}}^{1}}$ is the potential residual interference caused by the indices in $\mathcal {I}_{g}$ , but not included in $\mathcal {Z}_{c_{1}}^{1}$ , i.e., $\mathcal {Z}_{c_{1}}^{1}\neq \mathcal {I}_{g}$ . Otherwise, if $\mathcal {Z}_{c_{1}}^{1}=\mathcal {I}_{g}$ , i.e., both $\mathcal {I}_{g}$ and $\mathcal {Z}_{c_{1}}^{1}$ contain the same set of indices representing a correct detection of the index symbols, then we have $\pmb {r}_{\mathcal {I}_{g},\mathcal {Z}_{c_{1}}^{1}}=\pmb {0}$ . In (22), the noise vector $\breve {\pmb {w}}_{g}=f_{\text {CI}}^{-1}\{\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}}^{\dagger }\bar {\pmb {w}}_{g}\}\in \mathbb {C}^{K\times 1}$ is the linear combination of Gaussian noise samples, which is also a Gaussian noise vector. Based on (22), a simple symbol-by-symbol ML detection can be carried out, yielding \begin{align*} a^{1}(k,c_{1})=&\underset {a_{q}\in \mathcal {A}_{\phi }}{\arg \min }\left |{\breve {x}_{\text {d},g}(k,c_{1})-a_{q}}\right |^{2}, \\&\qquad \qquad \qquad k=0,\ldots ,K-1. \tag{23}\end{align*} View SourceRight-click on figure for MathML and additional features.

So far, we have obtained the estimations of the classic APM symbols $\pmb {a}^{1}(c_{1})=[\pmb {a}^{1}(0,c_{1}),\ldots ,\pmb {a}^{1}(K-1,c_{1})]^{T}$ from the candidate set $\mathcal {Z}_{c_{1}}^{1}\in \mathcal {Z}^{1}$ . Similarly, we can obtain the estimates of the classic APM symbols from the other candidates in $\mathcal {Z}^{1}$ of (20). Based on the estimates, let us define a set $\mathcal {A}^{1}=\left \{{\pmb {a}^{1}(1),\ldots ,\pmb {a}^{1}(C_{1})}\right \}\subset \mathcal {A}_{\phi }^{K}$ for all the possible APM symbols detected using the indices in $\mathcal {Z}^{1}$ . Then, the best one among them after the first iteration can be found by solving the optimization of \begin{align*} \left ({{\mathcal {I}}_{g}^{[{1}]}, {\pmb {x}}_{\text {d},g}^{[{1}]}}\right )=\underset {\mathcal {Z}_{c_{1}}^{1}\in \mathcal {Z}^{1}, \pmb {a}^{1}(c_{1})\in \mathcal {A}^{1}}{\arg \min }\left \|{\pmb {y}_{g}\!-\!\pmb {\Phi }_{g,\mathcal {Z}_{c_{1}}^{1}} f_{\text {CI}}\left \{{\pmb {a}^{1}(c_{1})}\right \}}\right \|^{2}_{2}.\!\!\!\!\! \\ \tag{24}\end{align*} View SourceRight-click on figure for MathML and additional features. Correspondingly, the residual error $\varepsilon ^{[{1}]}$ is given by \begin{equation*} \varepsilon _{g}^{[{1}]}=\left \|{\pmb {y}_{g}-\pmb {\Phi }_{g,\mathcal {I}_{g}^{[{1}]}} f_{\text {CI}}\left \{{\pmb {x}_{\text {d},g}^{[{1}]}}\right \}}\right \|^{2}_{2}. \tag{25}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Let $\varepsilon _{\text {TS}}$ be a threshold, which is used for terminating the search process, when the detection is believed to have achieved the required reliability. Then, if $\varepsilon _{g}^{[{1}]}\leq \varepsilon _{\text {TS}}$ , the search process is completed, and the results given in (24) are taken as the final estimates of the received IM and the classic APM symbols. Otherwise, the search process forwards to the next iteration.

Similarly to the first iteration, during the second iteration, the IRC detector first identifies a candidate set based on the index $i_{2}$ of the second largest in magnitude of the variables given in (19). It can be shown that the number of new candidates containing $i_{2}$ as a member satisfies $C_{2}\leq {\binom{N-1}{ {K-1}}}-{\binom{N-2}{ {K-2}}}={\binom{N-2}{ {K-1}}}<C$ , after excluding those having been considered in association with the candidates derived from index $i_{1}$ . Having obtained the candidate set for the second iteration, the other processes are repeated in the same way as in the first iteration. In general, when the IRC detector enters into the $t$ th iteration, the number of new candidates including $i_{t}$ as a member satisfies $C_{t}\leq {\binom{N-t}{ K-1}}<C$ . Based on the above-mentioned method, when all the $N$ indices are checked, we can readily show that $\sum \limits _{t=1}^{N}C_{t}=C=2^{L_{1}}$ . This implies that all the candidates in $\mathcal {Z}=\{\mathcal {Z}_{1},\ldots \mathcal {Z}_{C}\}$ have been checked by the IRC detector.

Finally, if the condition of $\varepsilon ^{[t]}\leq \varepsilon _{\text {TS}}$ cannot be fulfilled after the maximum affordable number of iterations, the detection result giving the minimum number of residual errors is output. In summary, our proposed IRC detector can be stated as in Algorithm 1.

Algorithm 1 IRC Detector

Require: $\pmb {y}_{g}$ , $\pmb {\Phi }_{g}=\bar {\pmb {H}}_{g}\pmb {A}$ , $\gamma _{s}$ , $\mathcal {Z}$ , $\varepsilon _{\text {TS}}$

1:

Initialization: Set the maximum number of iterations to $T$ , a check space of $\mathcal {Z}_{\text {check}}=\mathcal {Z}$ , $\varepsilon _{0}=\infty $ , $\mathcal {I}_{g}^{\text {IRC}}=\emptyset $ and $\pmb {x}_{\text {d},g}^{\text {IRC}}=\emptyset $ .

2:

MMSE detection based on (18), expressed as \begin{equation*} \hat {\pmb {x}}_{g}=\left ({\pmb {\Phi }_{g}^{H}\pmb {\Phi }_{g}+\frac {1}{\gamma _{s}}\pmb {I}_{N}}\right )^{-1}\pmb {\Phi }_{g}^{H}\pmb {y}_{g} ; \end{equation*} View SourceRight-click on figure for MathML and additional features.

3:

Order the elements in $\hat {\pmb {x}}_{g}$ in descending order according to their magnitudes as \begin{equation*} |\hat {x}_{g}(i_{1})|^{2}\geq |\hat {x}_{g}(i_{2})|^{2}\geq \ldots \geq |\hat {x}_{g}(i_{N})|^{2}. \end{equation*} View SourceRight-click on figure for MathML and additional features.

4:

for $t=1$ to $T$ do

5:

Obtain $\mathcal {Z}^{t}=\{\mathcal {Z}_{1}^{t},\mathcal {Z}_{2}^{t},\ldots ,\mathcal {Z}_{C_{t}}^{t}\}$ from $\mathcal {Z}_{\text {check}}$ , where $\bigcap _{c_{t}=1}^{C_{t}}\mathcal {Z}_{c_{t}}^{t}=i_{t}$ ;

6:

if $\mathcal {Z}^{t}=\emptyset $ then

7:

else

8:

For $c_{t}=1,\ldots ,C_{t}$ , calculate \begin{equation*} \breve {\pmb {x}}_{\text {d},g}(c_{t})=f_{\text {CI}}^{-1}\left \{{\pmb {\Phi }^{\dagger }_{g,\mathcal {Z}_{c_{t}}^{t}}\pmb {y}_{g}}\right \}; \end{equation*} View SourceRight-click on figure for MathML and additional features.

9:

Generate the estimates for the APM symbols associated with the candidates of $c_{t}=1,\ldots ,C_{t}$ according to (23) as \begin{align*} a^{t}(k,c_{t})=&\underset {a_{q}\in \mathcal {A}_{\phi }}{\arg \min } \left |{\breve {x}_{\text {d},g}(k,c_{t})-a_{q}}\right |^{2}, \\&\qquad \qquad \qquad \qquad k=0,1,\ldots ,K-1 \end{align*} View SourceRight-click on figure for MathML and additional features.

10:

Find the best estimates according to (24) as \begin{equation*} \left ({{\mathcal {I}}_{g}^{[t]}, {\pmb {x}}_{\text {d},g}^{[t]}}\right )\!=\!\underset {\mathcal {Z}_{c_{t}}^{t}\in \mathcal {Z}^{t}, \pmb {a}^{t}(c_{t})\in \mathcal {A}^{t}}{\arg \min }\!\left \|{\pmb {y}_{g}\!-\!\pmb {\Phi }_{g,\mathcal {Z}_{c_{t}}^{t}} f_{\text {CI}}\left \{{\pmb {a}^{t}(c_{t})}\right \}}\right \|^{2}_{2}. \end{equation*} View SourceRight-click on figure for MathML and additional features.

11:

Calculate the residual error according to (25) as \begin{equation*} \varepsilon _{g}^{[t]}=\left \|{\pmb {y}_{g}-\pmb {\Phi }_{g,\mathcal {I}_{g}^{[t]}} f_{\text {CI}} \left \{{\pmb {x}_{\text {d},g}^{[t]}}\right \}}\right \|^{2}_{2}; \end{equation*} View SourceRight-click on figure for MathML and additional features.

12:

if $\varepsilon _{g}^{[t]}<\varepsilon _{\text {TS}}$ then

13:

Update $\mathcal {I}_{g}^{\text {IRC}}=\mathcal {I}_{g}^{[t]}$ and $\pmb {x}_{\text {d},g}^{\text {IRC}}=\pmb {x}_{\text {d},g}^{[t]}$ .

14:

exit

15:

else if $\varepsilon _{g}^{[t]}<\varepsilon _{0}$ then

16:

Update $\mathcal {Z}_{\text {check}}=\mathcal {Z}_{\text {check}}\backslash \mathcal {Z}^{t}$ , $\varepsilon _{0}=\varepsilon _{g}^{[t]}$ , $\mathcal {I}_{g}^{\text {IRC}}=\mathcal {I}_{g}^{[t]}$ and $\pmb {x}_{\text {d},g}^{\text {IRC}}=\pmb {x}_{\text {d},g}^{[t]}$ .

17:

else

18:

end if

19:

end if

20:

end for

21:

return $\mathcal {I}_{g}^{\text {IRCD}}$ and $\pmb {x}_{\text {d},g}^{\text {IRCD}}$ .

The complexity of our proposed algorithm is determined by the number of iterations as well as the number of candidates in each iteration. Explicitly, the best case is that the detection is completed within a single iteration by testing only one candidate. In this case, we can readily show that the complexity is on the order of $\mathcal {O}_{\text {IRC}}^{\text {best}}(QK)$ . On the other hand, the worst case is that all the candidates in $\mathcal {Z}$ are checked. In this case, the corresponding complexity is given by $\mathcal {O}_{\text {IRC}}^{\text {worst}}(2^{L_{1}}QK)$ . Note that for $K>1$ active indices, the probability that $i_{1}$ seen in (19) is not an active index is usually very small. Therefore, in most cases, our IRC detector requires a single iteration for testing the $C_{1}\leq {\binom{N-1}{ {K-1}}}<C$ candidates. In this case, the detection complexity is given by $\mathcal {O}_{\text {IRC}}^{\text {usually}}(C_{1}QK)$ . In fact, our IRC detector can be constrained to simply carry out one or two iterations, as it will be shown in Section V.

SECTION IV.

Performance Analysis

In this section, the system performance of the OFDM-CSIM system is analyzed. In our analysis, the JML detector is assumed. We commence by deriving the SE and EE of the proposed system. Then, the analytical diversity order of the OFDM-CSIM system is detailed.

A. Spectral Efficiency and Energy Efficiency

Let us assume that the proposed OFDM-CSIM system is operated within a frequency band of $f_{\text {B}}$ Hertz. The total power consumed by transmitting the data at a reliable rate of $R$ in bit-per-second within a symbol duration of $T_{\text {s}}$ in second is denoted as $P_{\text {T}}$ Watts. We consider the specific case when the total power consumed is equal to the total power of the transmitted signal, i.e. we have $P_{\text {T}}=P_{\text {Tx}}$ . Then, the SE of $\eta _{\text {SE}}=R\slash f_{\text {B}}$ can be measured in bit-per-second-per-Hertz. Since each group is independent, the SE of the system shown in Section II can be expressed in terms of the channel SNR as [43]\begin{align*} f_{\text {SE}}(\gamma _{s})=&\frac {R}{f_{\text {B}}} \\=&\frac {\sum \limits _{g=1}^{G}I(\pmb {x}_{g};\pmb {y}_{g})}{T_{s} f_{\text {B}}}=\frac {\sum \limits _{g=1}^{G}I(\pmb {x}_{g};\pmb {y}_{g})}{M}, \tag{26}\end{align*} View SourceRight-click on figure for MathML and additional features. where $I(\pmb {x}_{g};\pmb {y}_{g})$ denotes the mutual information [44] associated with the transmission of the $g$ th group. Here, the rate reduction caused by the CP is ignored. Then, upon substituting (A.6) into (26), we have \begin{align*} f_{\text {SE}}(\gamma _{s})=&\frac {1}{M}\sum \limits _{g=1}^{G}\Biggl \{{\mathbb {E}_{\bar {\pmb {H}}_{g},\bar {\pmb {w}}_{g}}[-\log _{2} \epsilon (\bar {\pmb {w}}_{g},\bar {\pmb {H}}_{g},\gamma _{s})] } \\&{ \qquad \qquad -\,m\log _{2}\left ({\frac {\pi e K}{m\gamma _{s}}}\right ) }\Biggr \} \\=&\frac {G}{M}\Biggl \{{\mathbb {E}_{\bar {\pmb {H}}_{g},\bar {\pmb {w}}_{g}}[-\log _{2} \epsilon (\bar {\pmb {w}}_{g},\bar {\pmb {H}}_{g},\gamma _{s})] } \\&{ \qquad \quad -\,m\log _{2}\left ({\frac {\pi e K}{m\gamma _{s}}}\right ) }\Biggr \} \\=&\frac {\mathbb {E}_{\bar {\pmb {H}}_{g},\bar {\pmb {w}}_{g}}[-\log _{2} \epsilon (\bar {\pmb {w}}_{g},\bar {\pmb {H}}_{g},\gamma _{s})] }{m}-\log _{2}\left ({\frac {\pi e K}{m\gamma _{s}}}\right )\!, \\ \tag{27}\end{align*} View SourceRight-click on figure for MathML and additional features. where $\epsilon (\bar {\pmb {w}}_{g},\bar {\pmb {H}}_{g},\gamma _{s})$ is the implementation function, as defined in (A.7). It should be noted that it is not easy to further simplify (27) to a closed-form expression. Nevertheless, according to (A.7), its first term can be evaluated by Monte Carlo simulations. By contrast, since the second term of (27) is determined by the SNR per symbol $\gamma _{s}$ , the SE of (27) can be obtained accordingly, as it will be shown in Section V. Furthermore, we can readily show with the aid of (A.10) that the SE of (27) is upper bounded by \begin{align*} f_{\text {SE}}(\gamma _{s})=&\sum \limits _{g=1}^{G}\frac {I(\pmb {x}_{g};\pmb {y}_{g})}{M} \\\leq&\sum \limits _{g=1}^{G}\frac {L}{M}=\frac {L}{m}, \tag{28}\end{align*} View SourceRight-click on figure for MathML and additional features. where the upper bound $L\slash m$ is attainable, when the SNR per symbol $\gamma _{s}$ is sufficiently high.

On the other hand, the EE can be defined in terms of Joule-per-bit per noise level [43], or bit-per-Joule [3], [45], or bit-per-Joule per noise level [1]. In this paper, only the signal’s transmission power is considered, hence the EE definition of [1] is adopted. In this case, given the SE value of $f_{\text {SE}}(\gamma _{s})=\eta _{\text {SE}}$ , the corresponding EE can be expressed as [1]\begin{align*} \eta _{\text {EE}}=&\frac {\eta _{\text {SE}}}{P_{\text {T}}\slash N_{0}}=\frac {\eta _{\text {SE}}}{P_{\text {Tx}}\slash N_{0}} \\=&\frac {\eta _{\text {SE}}}{\gamma _{s} }=\frac {\eta _{\text {SE}}}{ f_{\text {SE}}^{-1}(\eta _{\text {SE}})}, \tag{29}\end{align*} View SourceRight-click on figure for MathML and additional features. where the last equality is arrived at by expressing $\gamma _{s}$ as an inverse function of the SE $\eta _{\text {SE}}$ , which gives the SNR per symbol required for achieving the SE of $\eta _{\text {SE}}$ . Again, since it is an open challenge to derive a closed-form expression for the EE shown in (29), the tradeoff between the SE and EE of our proposed system is studied by Monte Carlo simulations, as it will be shown in Section V.

Furthermore, let us define the received SNR per bit (or SNR per reliable bit) as $\gamma _{b}^{\text {Rx}}\triangleq E_{b}^{\text {Rx}}\slash N_{0}$ , where $E_{b}^{\text {Rx}}=P_{\text {Tx}}\slash \eta _{\text {SE}}$ is the received energy per bit in Joule-per-bit. Hence, we can explicitly show that $\gamma _{b}^{\text {Rx}}$ can be formulated in terms of the EE defined in (29) as \begin{align*} \gamma _{b}^{\text {Rx}}=\frac {\gamma _{s}}{\eta _{\text {SE}}}=&\frac {f_{\text {SE}}^{-1}(\eta _{\text {SE}})} {\eta _{\text {SE}}} \\=&\frac {1}{\eta _{\text {EE}}}, \tag{30}\end{align*} View SourceRight-click on figure for MathML and additional features. which can be used for quantifying the minimum received signal energy per information bit required for reliable communication, as it will be studied by simulation results shown in Section V.

B. Diversity and Coding Gains

Let us first define the pairwise error event as $\{\pmb {x}_{g}^{\text {c}}\to \pmb {x}_{g}^{\text {e}}\}$ , where $\pmb {x}_{g}^{\text {c}}=\pmb {v}_{i}$ is the transmitted symbol vector according to (2), while $\pmb {x}_{g}^{\text {e}}=\pmb {v}_{j}$ denotes the corresponding incorrect detection results of the ML detection shown in (13), i.e., we have $\pmb {v}_{i}\neq \pmb {v}_{j}$ for $\pmb {v}_{i},\pmb {v}_{j}\in \mathcal {V}$ . Based on (4), let $\pmb {s}_{g}^{\text {c}}=\pmb {A}\pmb {x}_{g}^{\text {c}}$ and $\pmb {s}_{g}^{\text {e}}=\pmb {A}\pmb {x}_{g}^{\text {e}}$ . Then, when the measurement matrix $\pmb {A}$ of the mutual coherence of (10) is used, similar to [46], the conditional pairwise error probability (PEP) can be expressed as \begin{align*} P\left ({\pmb {x}_{g}^{\text {c}}\to \pmb {x}_{g}^{\text {e}}|\bar {\pmb {H}}_{g} }\right )=&P\left ({\pmb {s}_{g}^{\text {c}}\to \pmb {s}_{g}^{\text {e}}|\bar {\pmb {H}}_{g} }\right ) \\=&Q\left ({\sqrt {\frac {m\gamma _{s}\left \|{\bar {\pmb {H}}_{g}\left ({\pmb {s}_{g}^{\text {c}}-\pmb {s}_{g}^{\text {e}}}\right )}\right \|^{2}_{2}}{2K}}}\right ) \\=&\frac {1}{\pi }\int \limits _{0}^{\frac {\pi }{2}}\exp \left ({ -\frac {m\gamma _{s} d^{2}\left ({\pmb {z}_{g}^{\text {c}},\pmb {z}_{g}^{\text {e}}}\right )}{4K\sin ^{2} \theta } }\right )\mathrm {d}\theta , \\ \tag{31}\end{align*} View SourceRight-click on figure for MathML and additional features. where $d^{2}\left ({\pmb {z}_{g}^{\text {c}},\pmb {z}_{g}^{\text {e}}}\right )= \left \|{\pmb {z}_{g}^{\text {c}}-\pmb {z}_{g}^{\text {e}}}\right \|^{2}_{2}$ denotes the squared Euclidean distance between $\pmb {z}_{g}^{\text {c}}=\bar {\pmb {H}}_{g}\pmb {s}_{g}^{\text {c}}$ and $\pmb {z}_{g}^{\text {e}}=\bar {\pmb {H}}_{g}\pmb {s}_{g}^{\text {e}}$ . With the aid of (7), we have \begin{align*} d^{2}\left ({\pmb {z}_{g}^{\text {c}},\pmb {z}_{g}^{\text {e}}}\right )=&\left \|{\bar {\pmb {H}}_{g}\left ({\pmb {s}_{g}^{\text {c}}-\pmb {s}_{g}^{\text {e}}}\right )}\right \|^{2}_{2} \\=&\left \|{\text {diag}\{\pmb {F}_{\text {h},\Pi _{g}}\pmb {h}_{\text {T}}\}\left ({\pmb {v}_{i}-\pmb {v}_{j}}\right ) }\right \|^{2}_{2} \\=&\left \|{\text {diag}\{\pmb {F}_{\text {h},\Pi _{g}}\pmb {h}_{\text {T}}\}\pmb {e}}\right \|^{2}_{2} \\=&\left \|{\pmb {E}\pmb {F}_{\text {h},\Pi _{g}}\pmb {h}_{\text {T}}}\right \|^{2}_{2} \\=&\pmb {h}_{\text {T}}^{H}\pmb {D}_{g}\pmb {h}_{\text {T}}, \tag{32}\end{align*} View SourceRight-click on figure for MathML and additional features. where we have $\pmb {E}=\text {diag}\left \{{\pmb {e}}\right \}\in \mathbb {C}^{m\times m}$ with $\pmb {e}\in \mathcal {E}$ as defined in (A.5) and $\pmb {D}_{g}=\pmb {F}_{\text {h},\Pi _{g}}^{H} \pmb {E}^{H}\pmb {E}\pmb {F}_{\text {h},\Pi _{g}}\in \mathbb {C}^{L_{\text {h}}\times L_{\text {h}}}$ . Furthermore, let the nonzero eigenvalues of $\pmb {D}_{g}$ be denoted as $\lambda _{i}$ for $i=1,\ldots , V_{\text {D}}$ , where \begin{align*} V_{\text {D}}=&\text {rank}\left ({\pmb {D}_{g}}\right )=\text {rank}(\pmb {F}_{\text {h},\Pi _{g}}^{H} \pmb {E}^{H}\pmb {E}\pmb {F}_{\text {h},\Pi _{g}}) \\=&\min \left \{{ \text {rank}\left ({ \pmb {E}}\right ),\text {rank}\left ({\pmb {F}_{\text {h},\Pi _{g}}}\right ) }\right \}. \tag{33}\end{align*} View SourceRight-click on figure for MathML and additional features. We can readily show that we have $\text {rank}(\pmb {E})=\|\pmb {e}\|_{0}\leq m$ and $\text {rank}(\pmb {F}_{\text {h},\Pi _{g}})=\min \{m,L_{\text {h}}\}$ , which gives \begin{equation*} V_{\text {D}}=\begin{cases} \|\pmb {e}\|_{0} & \text {if $m<L_{\text {h}}$}\\ L_{\text {h}} & \text {if $m\geq L_{\text {h}}$}. \end{cases} \tag{34}\end{equation*} View SourceRight-click on figure for MathML and additional features. We should emphasize here that since the measurement matrix $\pmb {A}\in \mathbb {C}^{m\times N}$ is used in our proposed system, the number of non-zero elements in $\pmb {e}\in \mathcal {E}$ is $\|\pmb {e}\|_{0}=m$ for most cases. As shown in [19], the maximum diversity order achieved by the conventional OFDM-SIM system is $2K$ . By contrast, in our proposed system, since (10) has to be satisfied for assisting the detection, it can be readily shown that for a large $N$ , we have $2K<\sqrt {m}$ , resulting in $m>(2K)^{2}$ . Therefore, the diversity order of our proposed system may be much higher than that of the conventional OFDM-SIM system, provided that $L_{\text {h}}>2K$ is satisfied.

Since $\pmb {h}_{\text {T}}$ is assumed to be an i.i.d. Gaussian distributed vector, after integrating the conditional PEP of (31) with respect to the distribution of the squared Euclidean distance of $d^{2}\left ({\pmb {z}_{g}^{\text {c}},\pmb {z}_{g}^{\text {e}}}\right )$ by following the approach shown in [8], the average PEP can be expressed as \begin{equation*} P\left ({\pmb {x}_{g}^{\text {c}}\to \pmb {x}_{g}^{\text {e}}}\right )=\frac {1}{\pi }\int \limits _{0}^{\frac {\pi }{2}}\prod \limits _{i=1}^{V_{\text {D}}} \left ({ 1+\frac {\lambda _{i} m\gamma _{s}}{4K\sin ^{2}\theta } }\right )^{-1}\mathrm {d}\theta . \tag{35}\end{equation*} View SourceRight-click on figure for MathML and additional features. Furthermore, for sufficiently high SNRs, (35) is upper bounded by [17], [47]\begin{equation*} P\left ({\pmb {x}_{g}^{\text {c}}\to \pmb {x}_{g}^{\text {e}}}\right )\leq \left ({ V_{\text {C}} \frac {m\gamma _{s}}{4K}}\right )^{-V_{\text {D}}}, \tag{36}\end{equation*} View SourceRight-click on figure for MathML and additional features. where $V_{\text {D}}$ gives the diversity order of the detection, while $V_{\text {C}}=\left ({\prod \limits _{i=1}^{V_{\text {D}}}\lambda _{i}}\right )^{1\slash V_{\text {D}}}$ is the coding gain of the OFDM-CSIM transmission scheme. We can see from (36) that the diversity order $V_{\text {D}}$ determines how rapidly the average PEP decreases with the increase of the SNR, while the coding gain $V_{\text {C}}$ determines the SNR-shift of this PEP curve relative to a benchmark error rate curve of $(\gamma _{s}\slash 4)^{-V_{\text {D}}}$ .

From the above analysis, we can infer the following observations. Firstly, when $m<L_{\text {h}}$ , the diversity order that can be achieved by the proposed OFDM-CSIM system is dependent on the number of non-zero elements in $\pmb {e}\in \mathcal {E}$ , which is $m$ in most cases. Secondly, provided that $m\geq L_{\text {h}}$ , the diversity order achieved by the proposed OFDM-CSIM system is $L_{\text {h}}$ , which is in this case as high as the number of multipath components. Finally, since $L$ given in (3) is independent of $m$ in our proposed system, the higher the value of $m$ , the lower the achievable SE of the system, as shown in (28). Hence, the diversity order of the proposed system can be increased at the cost of decreasing the achievable SE of the system.

SECTION V.

Simulation Results

In this section, simulation results are provided for characterizing the achievable performance of the proposed OFDM-CSIM system. The system setup and the parameters used in our simulations are summarized in Table 1. For all simulations, a ten-path (i.e. $L_{\text {h}}=10$ ) slow-varying Rayleigh fading channel is considered, which is based on Section II-B. We assume an OFDM system employing $M=256$ subcarriers and a CP of length of $L_{\text {cp}}=16$ . Moreover, QPSK modulation associated with a rotated angle of $\phi =\pi /12$ is used for modulating the activated subcarriers. For both the OFDM-SIM and our OFDM-CSIM systems, the number of active indices is chosen to be $K=2$ . Specifically, in order to satisfy the condition of (10), the partial Fourier matrix constructed by the search algorithm of [26] is employed as the measurement matrix $\pmb {A}$ for the OFDM-CSIM system, as shown in Table 1.3

TABLE 1 Parameters for all Simulations
Table 1- 
Parameters for all Simulations

In Fig. 4, both the SE and EE are investigated as a function of the SNR in dB for both the OFDM-SIM and the OFDM-CSIM systems, when communicating over Rayleigh fading channels. In this figure, the unrotated QPSK constellation (i.e., $\phi =0$ ) is assumed, but the CI and the depth-$G$ interleaver are not employed. Furthermore, both the OFDM-SIM and the OFDM-CSIM systems employ the JML detector of Section III-A for the sake of comparison. Firstly, we observe from Fig. 4 that the achievable SE of the proposed CSIM scheme is higher than that of the conventional SIM scheme. This observation can be explained with the aid of the analytical results of (3) and (28). Explicitly, as shown in (28), when the value of $m$ is fixed, the achievable SE of both the SIM and the CSIM schemes depend on the number of data bits $L$ transmitted by each group. Furthermore, when the values of $K$ and $Q$ are fixed, more data bits can be transmitted by the CSIM associated with $N>m$ than by the SIM using $N=m$ , as exemplified in Section II-A. Thus, the attainable SE of the CSIM is higher than that of the conventional SIM. Moreover, we can also show that the corresponding SE is reduced both for the CSIM and for the SIM, as the value of $m$ is increased. Secondly, as seen in Fig. 4, for a given SNR, our proposed CSIM scheme is capable of achieving a higher EE than the conventional SIM scheme. Meanwhile, the SE of our CSIM scheme is also higher than that of the conventional SIM scheme. In other words, our proposed CSIM scheme is capable of striking a more appealing tradeoff between the SE and EE than the conventional SIM scheme. This observation can be explained with the aid of the analytical results of (29) and the numerical SE results shown in this figure. As observed in Fig. 4, for a given SE, the SNR required by our CSIM scheme is lower than that of the SIM scheme. Since the EE defined by (29) is inversely proportional to the SNR for a given SE, the EE of our CSIM is in turn higher than that of the conventional SIM. Thirdly, as shown in Fig. 4, the maximum EE that can be attained by both schemes is about $1\slash \ln 2\approx 1.4427$ . This result inferred from (30) represents the minimum energy per bit required for reliable communication, which is given by $\gamma _{b,\text {min}}^{\text {Rx}}=\ln 2$ . This confirms the analytical result given in [43]. As demonstrated in [43], when the SNR is low, the minimum energy per bit required for reliable communication is $\ln 2$ , which is independent of the fading. Hence, for OFDM systems having a fixed transmission power, bandwidth and IFFT/FFT size, our proposed CSIM scheme is capable of striking a more appealing tradeoff between the SE and EE than the conventional SIM scheme.

FIGURE 4. - SE and EE as a function of the SNR in dB for both the OFDM-SIM and the OFDM-CSIM systems communicating over an 
$L_{\text {h}}=10$
-path Rayleigh fading channel. The system parameters are given in Table 1.
FIGURE 4.

SE and EE as a function of the SNR in dB for both the OFDM-SIM and the OFDM-CSIM systems communicating over an $L_{\text {h}}=10$ -path Rayleigh fading channel. The system parameters are given in Table 1.

Fig. 5 plots the complementary cumulative distribution function (CCDF) of the number of iterations for the proposed IRC detector of our CSIM scheme, when communicating over an $L_{\text {h}}=10$ -path Rayleigh fading channel. Generally, the CCDF is the probability that a random variable $X$ will take a value higher than $x$ , i.e. we have $\text {CCDF}_{X}(x)\triangleq P(X>x)$ . In this figure, the OFDM-CSIM system employing CI and the depth-$G$ interleaver operates at the SNR per bit value of $\gamma _{b}=0$ dB, 7 dB or 15 dB. As seen in Fig. 5, the CCDF curves first exhibit a sharp decay and then become flat as the number of iterations increases. This observation implies that with a near-unity probability, the IRC detector completes the detection in just a single iteration. Furthermore, when just a single iteration is considered, the difference of the probabilities for a given CSIM operating at different SNR per bit values is unnoticeable. Thus, it can be inferred that the performance of the IRC detector operating at just one iteration is stable at all SNR per bit values. Finally, we can also see that as the EE of the CSIM system increases, the probability of completing detection in just one iteration increases. It should be noted that the fewer iterations the IRC detector invokes, the lower its complexity becomes, as analyzed in Section III-B.

FIGURE 5. - CCDF of the number of iterations of the IRC detector for the CSIM employing CI and a depth-
$G$
 interleaver operates at the SNR per bit value of 
$\gamma _{b}=0$
 dB, 7 dB or 15 dB, when communicating over an 
$L_{\text {h}}=10$
-path Rayleigh fading channel.
FIGURE 5.

CCDF of the number of iterations of the IRC detector for the CSIM employing CI and a depth-$G$ interleaver operates at the SNR per bit value of $\gamma _{b}=0$ dB, 7 dB or 15 dB, when communicating over an $L_{\text {h}}=10$ -path Rayleigh fading channel.

In Fig. 6, we investigate the detection complexity imposed by detecting each group of symbols, when both the JML and IRC detectors are employed. In this figure, the IRC detector of Algorithm 1 relying on $T=1,\ldots ,N$ iterations is considered for our CSIM scheme. We observe that when JML detectors are used, the detection complexity of the CSIM is higher than that of the conventional SIM. However, as seen in Fig. 6, the detection complexity can be significantly reduced by using our proposed IRC detector, especially when the maximum number of iterations is set to $T=1$ or 2. Furthermore, we can observe that the detection complexity of our CSIM using the IRC detector is lower than that of the same scheme using the JML detector, even for the worst case of the IRC detector. There are two reasons for this trend. Firstly, each index is uniquely checked, as shown in Algorithm 1. In this way, the repeated reliability computations of the same index are avoided. The other reason can be readily inferred from comparing (23) to (14), where the APM symbols are detected on a symbol-by-symbol basis by the IRC detector, while the joint group detection is carried out by the JML detector. Finally, we can show with the aid of Fig. 5 that our proposed IRC detector is an efficient one for the CSIM considered.

FIGURE 6. - Detection complexity required for detecting each group of symbols, when the JML detector (JMLD) and the IRC detector (IRCD) are employed. For the IRCD of Algorithm 1, the maximum number of iterations is chosen to be 
$T=1,\ldots , N$
.
FIGURE 6.

Detection complexity required for detecting each group of symbols, when the JML detector (JMLD) and the IRC detector (IRCD) are employed. For the IRCD of Algorithm 1, the maximum number of iterations is chosen to be $T=1,\ldots , N$ .

The BER performance of the classic OFDM, OFDM-SIM and OFDM-CSIM systems is compared in Fig. 7–, and Fig. 9. In these figures, both the OFDM-SIM and the OFDM-CSIM systems employ CI, the depth-$G$ interleaver as well as JML detectors. Explicitly, for the OFDM-CSIM systems, Fig. 7, and Fig. 9, respectively, are characterized by $m=8$ , $m=16$ and $m=32$ , as well as the corresponding system parameters given in Table 1. For the sake of comparison, only 160 subcarriers are used for the transmission of QPSK symbols in the classic OFDM system, yielding a transmission rate of 1.25 bits/s/Hz. Similarly, the OFDM-SIM system employs 212 subcarriers for carrying SIM-($m=4$ , $K=2$ , $Q=4$ ) symbols, giving a transmission rate of 1.2422 bits/s/Hz. Here, we should point out that reducing the number of transmission subcarriers results in a certain power gain reduction, rather than in a BER curve slope-change. We can observe from these figures that the OFDM-CSIM significantly outperforms both the classic OFDM and the OFDM-SIM. Furthermore, in the high-SNR region, the performance gain of the systems associated with $m=16$ (0.75 bits/s/Hz) in Fig. 8 are similar to those associated with $m=32$ (0.4375 bits/s/Hz) in Fig 9, both of which are higher than that of the systems associated with $m=8$ in Fig. 10. For example, at a BER of $10^{-3}$ , about 16 dB gain is observed both in Fig. 8 and Fig. 9 for our OFDM-CSIM systems. By contrast, about 14 dB gain is observed in Fig. 7. These observations can be explained with the aid of our analytical results shown in Section IV-B. As analyzed in Section IV-B, when the measurement matrix $\pmb {A}$ associated with a mutual coherence satisfying (10) is used, the proposed OFDM-CSIM system becomes capable of achieving $V_{\text {D}}$ -order diversity, where $V_{\text {D}}$ is given in (34). Since the diversity order of the OFDM-CSIM system is much higher than that of the conventional OFDM-SIM, a better BER performance can be attained by the OFDM-CSIM system. Furthermore, as shown in (34), the diversity order found for the case of $m<L_{\text {h}}$ (Fig. 7) is lower than that for the case of $m\geq L_{\text {h}}$ (Fig. 8 and Fig. 9). Hence, a higher performance gain can be achieved by the OFDM-CSIM system associated with $m=16,32$ than that with $m=8$ . Meanwhile, for the case of $m\geq L_{\text {h}}$ , the maximum multipath diversity gain is achieved by the OFDM-CSIM system. Thus, the performance gains achieved by the OFDM-CSIM system having $m=16$ and $m=32$ are the same. Finally, as inferred from (34) and the above observations, we can show that for a target throughput higher than 2 bits/s/Hz, our CS-assisted OFDM-SIM system is capable of attaining a similar performance gain to that of the classic OFDM systems (as seen in (34), the maximum attainable diversity order is independent of the throughput).

FIGURE 7. - BER performance of the classic OFDM, OFDM-SIM and OFDM-CSIM systems communicating over an 
$L_{\text {h}}=10$
-path Rayleigh fading channel. Both the OFDM-SIM and the OFDM-CSIM systems employ CI, a depth-
$G$
 interleaver as well as JML detectors.
FIGURE 7.

BER performance of the classic OFDM, OFDM-SIM and OFDM-CSIM systems communicating over an $L_{\text {h}}=10$ -path Rayleigh fading channel. Both the OFDM-SIM and the OFDM-CSIM systems employ CI, a depth-$G$ interleaver as well as JML detectors.

FIGURE 8. - BER performance of the classic OFDM, OFDM-SIM and OFDM-CSIM systems communicating over an 
$L_{\text {h}}=10$
-path Rayleigh fading channel. Both the OFDM-SIM and the OFDM-CSIM systems employ CI, a depth-
$G$
 interleaver as well as JML detectors.
FIGURE 8.

BER performance of the classic OFDM, OFDM-SIM and OFDM-CSIM systems communicating over an $L_{\text {h}}=10$ -path Rayleigh fading channel. Both the OFDM-SIM and the OFDM-CSIM systems employ CI, a depth-$G$ interleaver as well as JML detectors.

FIGURE 9. - BER performance of the classic OFDM, OFDM-SIM and OFDM-CSIM systems communicating over an 
$L_{\text {h}}=10$
-path Rayleigh fading channel. Both the OFDM-SIM and the OFDM-CSIM systems employ CI, a depth-
$G$
 interleaver as well as JML detectors.
FIGURE 9.

BER performance of the classic OFDM, OFDM-SIM and OFDM-CSIM systems communicating over an $L_{\text {h}}=10$ -path Rayleigh fading channel. Both the OFDM-SIM and the OFDM-CSIM systems employ CI, a depth-$G$ interleaver as well as JML detectors.

FIGURE 10. - BER versus SNR per bit for the OFDM-CSIM using the JML detector and the IRC detector. The OFDM-CSIM with (
$N=15$
, 
$m=8$
) employs CI and a depth-
$G$
 interleaver. For the IRC detector shown in Algorithm 1, the maximum number of iterations is chosen to be 
$T=1$
, 2 or 
$N=15$
.
FIGURE 10.

BER versus SNR per bit for the OFDM-CSIM using the JML detector and the IRC detector. The OFDM-CSIM with ($N=15$ , $m=8$ ) employs CI and a depth-$G$ interleaver. For the IRC detector shown in Algorithm 1, the maximum number of iterations is chosen to be $T=1$ , 2 or $N=15$ .

In Fig. 10, and Fig. 12, we investigate the BER performance of both the JML detector and the IRC detector for the OFDM-CSIM systems communicating over an $L_{\text {h}}=10$ -path Rayleigh fading channel. In these figures, the OFDM-CSIM system employs CI and the depth-$G$ interleaver. Explicitly, Fig. 10, and Fig. 12 are respectively characterized by $m=8$ , $m=16$ and $m=32$ , while the corresponding system parameters are given in Table 1. We observe from the results of Fig. 10, and Fig. 12 that the BER performance of the OFDM-CSIM system using our IRC detector invoking a single iteration is stable for all SNR per bit values. This observation verifies our inference obtained from the results of Fig. 5. Furthermore, as seen in Fig. 10, Fig. 11 and Fig. 12, a good BER performance is attainable for the IRC detector using just a single iteration (Fig. 11 and Fig. 12) or two iterations (Fig. 10). Bearing in mind the complexity results of Fig. 6, it can be readily shown that the complexity of the proposed IRC detector can be further reduced by limiting the maximum number of iterations at the cost of a few dBs performance loss. Therefore, when the IRC detector is employed by the OFDM-CSIM system, the maximum number of iterations may be appropriately adjusted for striking a flexible tradeoff between the performance gain attained and the complexity imposed.

FIGURE 11. - BER versus SNR per bit for the OFDM-CSIM using the JML detector and the IRC detector. The OFDM-CSIM with (
$N=31$
, 
$m=16$
) employs CI and a depth-
$G$
 interleaver. For the IRC detector shown in Algorithm 1, the maximum number of iterations is chosen to be 
$T=1$
, or 
$N=31$
.
FIGURE 11.

BER versus SNR per bit for the OFDM-CSIM using the JML detector and the IRC detector. The OFDM-CSIM with ($N=31$ , $m=16$ ) employs CI and a depth-$G$ interleaver. For the IRC detector shown in Algorithm 1, the maximum number of iterations is chosen to be $T=1$ , or $N=31$ .

FIGURE 12. - BER versus SNR per bit for the OFDM-CSIM using the JML detector and the IRC detector. The OFDM-CSIM with (
$N=61$
, 
$m=32$
) employs CI and a depth-
$G$
 interleaver. For the IRC detector shown in Algorithm 1, the maximum number of iterations is chosen to be 
$T=1$
, or 
$N=61$
.
FIGURE 12.

BER versus SNR per bit for the OFDM-CSIM using the JML detector and the IRC detector. The OFDM-CSIM with ($N=61$ , $m=32$ ) employs CI and a depth-$G$ interleaver. For the IRC detector shown in Algorithm 1, the maximum number of iterations is chosen to be $T=1$ , or $N=61$ .

SECTION VI.

Conclusions

In this paper, a CSIM scheme has been proposed. Our analytical results have shown that in comparison to the conventional SIM, our proposed scheme is capable of achieving a higher SE, which has also been verified by our simulation results. Moreover, we have shown that the CSIM is capable of striking a more appealing tradeoff between the SE and EE than the conventional SIM. Then, the JML detector has been considered for our CSIM scheme. Based on the JML detector, the diversity order of the CSIM has been first analyzed mathematically, and then, it was verified by simulations. Both the analytical and the simulation results show that in comparison to the SIM system, our proposed system is capable of providing a significantly higher diversity gain. Finally, the reduced-complexity IRC detector was proposed for our CSIM scheme. Simulations results have been provided for investigating its detection performance. Our investigations demonstrated that in comparison to the JML detector, the complexity of our IRC detector is much lower, while its performance is close to that of the JML detector.

Appendix

Derivation of SE

According to Section III, the channel state information (CSI) is assumed to be perfectly known at the receiver. Hence, based on (9), the mutual information $I(\pmb {x}_{g};\pmb {y}_{g})$ can be expressed as [44]\begin{align*} I\left ({\pmb {x}_{g};\pmb {y}_{g}}\right )=&\mathbb {E}_{\bar {\pmb {H}}_{g}}[I(\pmb {x}_{g};\pmb {y}_{g}|\bar {\pmb {H}}_{g})] \\=&\mathbb {E}_{\bar {\pmb {H}}_{g}}[\mathcal {H}(\pmb {y}_{g}|\bar {\pmb {H}}_{g})-\mathcal {H}(\pmb {y}_{g}|\pmb {x}_{g},\bar {\pmb {H}}_{g})] \\=&\mathbb {E}_{\bar {\pmb {H}}_{g}}[\mathcal {H}(\pmb {y}_{g}|\bar {\pmb {H}}_{g})]-\mathcal {H}(\bar {\pmb {w}}_{g}), \tag{A.1}\end{align*} View SourceRight-click on figure for MathML and additional features. where the differential entropy of the $m$ -dimensional complex Gaussian vector with a mean vector $\pmb {0}$ and a covariance matrix of $N_{0}\pmb {I}_{m}$ is given by [44]\begin{align*} \mathcal {H}(\bar {\pmb {w}}_{g})=&\log _{2}(\pi eN_{0})^{m}=m\log _{2}(\pi eN_{0}) \\=&m\log _{2}\left ({\frac {\pi e K}{m\gamma _{s}}}\right ). \tag{A.2}\end{align*} View SourceRight-click on figure for MathML and additional features. On the other hand, the conditional entropy $\mathcal {H}(\pmb {y}_{g}|\bar {\pmb {H}}_{g})$ can be formulated as [44]\begin{align*} \mathcal {H}(\pmb {y}_{g}|\bar {\pmb {H}}_{g})=&-\int _{\pmb {y}_{g}}p(\pmb {y}_{g}|\bar {\pmb {H}}_{g})\log _{2} p(\pmb {y}_{g}|\bar {\pmb {H}}_{g})\mathrm {d}\pmb {y}_{g} \\=&\mathbb {E}_{\pmb {y}_{g}}[-\log _{2} p(\pmb {y}_{g}|\bar {\pmb {H}}_{g})]. \tag{A.3}\end{align*} View SourceRight-click on figure for MathML and additional features. According to Section II-A, the vector space $\mathcal {V}$ is defined so that each group of $L$ data bits can be regarded as being directly mapped into a symbol vector in $\mathcal {V}$ . Since the input data bits are i.i.d, it is reasonable to assume that the candidates in $\mathcal {V}$ are equiprobable, i.e. we have $p(\pmb {v}_{i})=1\slash 2^{L}$ for $i=1,\ldots ,2^{L}$ . Hence, with the aid of (11) and by invoking Bayes’ rule, the conditional probability $p(\pmb {y}_{g}|\bar {\pmb {H}}_{g})$ can be expressed as \begin{align*}&\hspace {-2pc}p(\pmb {y}_{g}|\bar {\pmb {H}}_{g}) \\=&\sum \limits _{i=1}^{2^{L}}p(\pmb {y}_{g}|\pmb {v}_{i},\bar {\pmb {H}}_{g})p(\pmb {v}_{i})=\frac {1}{2^{L}}\sum \limits _{i=1}^{2^{L}}p(\pmb {y}_{g}|\pmb {v}_{i},\bar {\pmb {H}}_{g}) \\=&\frac {1}{2^{L}}\sum \limits _{i=1}^{2^{L}}\frac {1}{(\pi N_{0})^{m}}\exp \left \{{ -\frac {\|\pmb {y}_{g}-\bar {\pmb {H}}_{g}\pmb {A}\pmb {v}_{i}\|_{2}^{2}}{N_{0}} }\right \} \\=&\frac {1}{2^{L}}\sum \limits _{i=1}^{2^{L}}\frac {1}{(\pi N_{0})^{m}}\exp \left \{{ -\frac {\|\bar {\pmb {H}}_{g}\pmb {A}(\pmb {x}_{g}-\pmb {v}_{i})+\bar {\pmb {w}}_{g}\|_{2}^{2}}{N_{0}} }\right \}\!. \\ \tag{A.4}\end{align*} View SourceRight-click on figure for MathML and additional features. Additionally, let us define a set of \begin{equation*} \mathcal {E}\triangleq \{\pmb {e}=\pmb {A}(\pmb {v}_{j}-\pmb {v}_{i}): \pmb {v}_{i}\neq \pmb {v}_{j},\forall {\pmb {v}_{i},\pmb {v}_{j}}\in \mathcal {V}\} . \tag{A.5}\end{equation*} View SourceRight-click on figure for MathML and additional features. Then, with the aid of (A.5), Eq. (A.4) can be formulated as \begin{align*} p(\pmb {y}_{g}|\bar {\pmb {H}}_{g})=&\frac {1}{2^{L}}\Biggl ({\frac {1}{(\pi N_{0})^{m}}\exp \left \{{ -\frac {\|\bar {\pmb {w}}_{g}\|_{2}^{2}}{N_{0}} }\right \}} \\&{ \quad +\,\mathbb {E}_{\pmb {e}}\left [{\frac {1}{(\pi N_{0})^{m}}\exp \left \{{ -\frac {\|\bar {\pmb {H}}_{g}\pmb {e}+\bar {\pmb {w}}_{g}\|_{2}^{2}}{N_{0}} }\right \}}\right ]}\Biggr ) \\=&\frac {1}{2^{L}}\left ({\frac {m\gamma _{s}}{\pi K}}\right )^{m}\Biggl ({\exp \left \{{ -\frac {\|\bar {\pmb {w}}_{g}\|_{2}^{2}}{K}m\gamma _{s} }\right \}} \\&{ \qquad +\,\mathbb {E}_{\pmb {e}}\left [{\exp \left \{{ -\frac {\|\bar {\pmb {H}}_{g}\pmb {e}+\bar {\pmb {w}}_{g}\|_{2}^{2}}{K}m\gamma _{s} }\right \}}\right ]}\Biggr ), \\ \tag{A.6}\end{align*} View SourceRight-click on figure for MathML and additional features. which is dependent on $\bar {\pmb {w}}_{g}$ given $\bar {\pmb {H}}_{g}$ and $\gamma _{s}$ . Hence, for the sake of convenience, we define the implementation function of \begin{equation*} \epsilon (\bar {\pmb {w}}_{g},\bar {\pmb {H}}_{g},\gamma _{s})\triangleq p(\pmb {y}_{g}|\bar {\pmb {H}}_{g}) \tag{A.7}\end{equation*} View SourceRight-click on figure for MathML and additional features. to explicitly emphasize the dependence on the channel parameters. Then, Eq.(A.3) can be alternatively expressed as \begin{equation*} \mathcal {H}(\pmb {y}_{g}|\bar {\pmb {H}}_{g})=\mathbb {E}_{\bar {\pmb {w}}_{g}}[-\log _{2} \epsilon (\bar {\pmb {w}}_{g},\bar {\pmb {H}}_{g},\gamma _{s})]. \tag{A.8}\end{equation*} View SourceRight-click on figure for MathML and additional features. Finally, upon substituting (A.2) and (A.8) into (A.1), we arrive at \begin{align*} I\left ({\pmb {x}_{g};\pmb {y}_{g}}\right )= \mathbb {E}_{\bar {\pmb {H}}_{g},\bar {\pmb {w}}_{g}}[-\log _{2} \epsilon (\bar {\pmb {w}}_{g},\bar {\pmb {H}}_{g},\gamma _{s})]-m\log _{2}\!\left ({\!\frac {\pi e K}{m\gamma _{s}}\!}\right )\!.\!\!\!\! \\ \tag{A.9}\end{align*} View SourceRight-click on figure for MathML and additional features.

It should be noted that the upper bound of $I(\pmb {x}_{g};\pmb {y}_{g})$ in our scenario can be derived as \begin{align*} I\left ({\pmb {x}_{g};\pmb {y}_{g}}\right )=&\mathbb {E}_{\bar {\pmb {H}}_{g}}[I(\pmb {x}_{g};\pmb {y}_{g}|\bar {\pmb {H}}_{g})] \\=&\mathbb {E}_{\bar {\pmb {H}}_{g}}[\mathcal {H}(\pmb {x}_{g}|\bar {\pmb {H}}_{g})-\mathcal {H}(\pmb {x}_{g}|\pmb {y}_{g},\bar {\pmb {H}}_{g})] \\=&\mathcal {H}(\pmb {x}_{g})-\mathbb {E}_{\bar {\pmb {H}}_{g}}[\mathcal {H}(\pmb {x}_{g}|\pmb {y}_{g},\bar {\pmb {H}}_{g})] \\\leq&\mathcal {H}(\pmb {x}_{g})=-\sum \limits _{i=1}^{2^{L}}p(\pmb {v}_{i})\log _{2} p(\pmb {v}_{i}) \\=&-\sum \limits _{i=1}^{2^{L}}\frac {1}{2^{L}}\log _{2} \frac {1}{2^{L}}=L, \tag{A.10}\end{align*} View SourceRight-click on figure for MathML and additional features. where the upper bound is achieved, when $\gamma _{s}$ is sufficiently high.

References

References is not available for this document.