Skip to main content

Reliability-aware iterative detection scheme (RAID) for distributed IDM space-time codes in relay systems

Abstract

In this article, distributed interleave-division multiplexing space-time codes (dIDM-STCs) are applied for multi-user two-hop decode-and-forward (DF) relay networks. In case of decoding errors at the relays which propagate to the destination, severe performance degradations can occur as the original detection scheme for common IDM-STCs does not take any reliability information about the first hop into account. Here, a novel reliability-aware iterative detection scheme (RAID) for dIDM-STCs is proposed. This new detection scheme takes the decoding reliability of the relays for each user into account for the detection at the destination. Performance evaluations show that the proposed RAID scheme clearly outperforms the original detection scheme and that in certain scenarios even a better performance than for adaptive relaying schemes can be achieved.

1 Introduction

During the last decade, cooperative communications and especially relaying has been a promising and constantly growing field of research. While, in the first place, the main purpose for introducing relays into wireless communication systems was the reduction of path losses between communicating nodes, relay systems also offer spatial diversity and, therefore, allow for the adoption of diversity exploiting techniques known from multi-antenna (Multiple Input - Multiple Output, MIMO) systems. MIMO systems have been shown to allow for a significantly higher performance in terms of throughput or robustness against fading than their single-antenna counterparts, which is mainly due to the exploitation of space for further degrees of freedom in addition to time and frequency [1, 2].

In this study, we consider a two-hop relaying system in which multiple sources transmit to one destination via a number of parallel relays. In such a system, the distributed relays can be grouped into a so-called Virtual Antenna Array (VAA), which can then be used to jointly process data, exploiting receive or transmit diversity [3]. Due to the distributed fashion of the VAA it can not be assumed that all nodes within the VAA can exchange arbitrarily much information as this would severely increase the signaling overhead and subsequently decrease the overall throughput. Hence, it is not possible to achieve perfect receive cooperation among all nodes within the VAA with justifiable effort. However, since the focus of this study is on the exploitation of transmit diversity, no receive cooperation at all is assumed and, thus, signaling among the relays is avoided. This means that each relay might estimate the source information differently. Furthermore, besides the limited exchange of information, it is also a challenging task to keep all nodes perfectly synchronous in terms of timing and frequency. Asynchronism among the nodes of the VAA or, in general, among different VAAs can lead to severe performance degradations for transmission schemes which require strict orthogonality among the transmitting nodes.

One of the most prominent transmit cooperation techniques applied to VAAs is Space-Time Coding. Space-Time Coding evolved in the context of MIMO systems and is a very efficient transmit diversity exploiting strategy if no Channel State Information (CSI) is available at the transmitter [4, 5]. The idea behind Space-Time Coding is to exploit space and time as two dimensions for coding. The first applications of Space-Time Codes (STCs) to relaying systems was done in [6] and later in [7]. Since these approaches were direct adoptions of Alamouti’s scheme and its corresponding generalization, they principally require perfect orthogonality among the relay signals. In [8, 9] a STC approach based on the non-orthogonal multiple access scheme Interleave-Division Multiple Access (IDMA) [10] has been presented. This Interleave-Division Multiplexing Space-Time Code (IDM-STC) does not require any synchronization among the transmit antennas which makes it a promising technique for relay systems. Consequently, the IDM-STC has been applied to relay systems in a distributed fashion using uncoded transmission and the Decode-and-Forward (DF) relaying protocol [11]. In [12], the principles of distributed IDM-STCs (dIDM-STCs) have been extended to coded systems and further relay protocols like Amplify-and-Forward (AF) and Decode-Estimate-and-Forward (DEF). It has been shown, that the dIDM-STC is in fact a good choice for relaying systems due to its flexibility regarding code rate and number of transmitting nodes and due to its robustness against asynchronisms. However, it was also pointed out that non-perfect decoding at the relays has to be taken into account at the destination as it leads to error propagation, which is a general problem of DF since it can severely degrade the overall performance.

One possibility to deal with erroneous decoding at the relays is to adaptively select only those relays to forward to the destination which have decoded correctly [7]. However, since erroneous relays may still contribute to the transmission, it does not seem reasonable to discard erroneously decoded messages. Instead, all relays should forward to the destination and the detector should handle the correct as well as the erroneous messages properly. In [13] a detector for uncoded DF was presented which applies a weighting of the relay messages according to the reliability of the whole source-relay-destination link. For that, all S-R-D links were modeled by equivalent Gaussian channels whose SNRs are dependent on the bit error probabilities on both hops. The messages over different S-R-D links were then weighted according to the respective equivalent SNR and finally combined. In [14, 15] distributed turbo codes in DF systems were investigated. In these studies, the first hop transmission was modeled using a Binary Symmetric Channel (BSC) with a crossover probability dependent on the first hop transmission quality, i.e., the bit error probability at the relay. The BSC model was then used in order to weight the exchanged information between the two constituent decoders at the destination. In [16] we presented a modified detection strategy for dIDM-STC, adopting the ideas from [13, 14] and incorporating the decoding reliability of the relays into the detection at the destination. This was achieved by estimating the decoding reliabilities at the relays and signaling this information to the destination. The reliability information of all relays was then used for a weighted combining of the relay messages. As a result, a significant performance improvement was achieved compared to the common detection scheme for dIDM-STC from [12]. However, it could also be seen that the actual usage of the available information at the destination was not yet optimal as the results indicated a performance gap compared to adaptive relaying schemes in which only correct relays forward to the destination.

In this article, we present a novel Reliability-Aware Iterative Detection scheme (RAID) for distributed IDM-STCs in Decode-and-Forward relay systems. The main idea of this scheme is to distinguish between the detection of the relay messages and the subsequent estimation of the source messages. First, a grouping of the relays is introduced and the relays are separated by their decoding success. While the signals from the successful relays are combined and jointly decoded, as for the common detector, the signals from the erroneous relays are all processed separately. The goal here is to firstly estimate the relay messages as good as possible. This approach is different to [16] where all relay signals were combined during the iterative detection, directly estimating the source information. After the final iteration of the iterative detection process, the estimates of the messages of the correct relays and the estimates of the messages of the erroneous relays are combined using a weighting operation similar to [16] in order to estimate the source messages. In contrast to [16], here the weighting is carried out after the iterative detection process, i.e., after firstly estimating the relay messages. While first ideas of this new detection scheme have been presented in [17], here the RAID scheme is extended to the multi-user case. We present more detailed derivations as in [17] and also give much further insight especially into the determination of the error probabilities at the relays. We will show that estimating the error probabilities in a practical system leads to almost no performance loss compared to a perfect knowledge. Moreover, extensive comparisons with other detection schemes like the common detection scheme or the adaptive scheme are given and discussed for single-user as well as for multi-user systems. As will be shown, the proposed RAID scheme achieves significant performance improvements compared to the common detection and to the strategy in [16]. It even performs better than the adaptive relaying scheme in certain scenarios, as it also exploits information from erroneous relays which is not the case for the adaptive scheme.

The remainder of this article is structured as follows. In Section 2 the system model is presented and its components are discussed in detail. Section 3.1 discusses the common detection scheme and addresses the main problems which arise in the context of relay systems. Section 4 is dedicated to the new proposed RAID scheme. First, an equivalent transmission model for the source relay transmission is presented and discussed, which is the basis for the formulation of the new detector. Then, the new RAID scheme is presented in detail. In Section 6 numerical results are given and the RAID scheme is compared to the conventional IDM-STC detection scheme as well as to an adaptive scheme. In Section 7, finally, some conclusions are drawn.

The nomenclature for this article is as follows. Scalars are denoted by small letters a, while column vectors are denoted by bold letters a=[a 1a N ]T and matrices by bold capital letters A=[a 1,1a 1,N ; … ;a M,1a M,N ]. Interleaved sequences are denoted by a dash a’ and double interleaved sequences by two dashes a”. Log-likelihood-ratios (LLRs) of scalar a and of elements of a vector a are denoted by Λ a =log Pr { a = 0 } Pr { a = 1 } and Λ a = Λ a 1 , , Λ a N , respectively. The expectation of a random process X is expressed as E{X} and its variance as σ X 2 . The L2-norm of a vector a is denoted by a and F 2 is the gallois field GF(2).

2 System model

2.1 Overview

A two-hop relay system as depicted in Figure 1 is considered. Multiple sources S m , 1≤mM, communicate with one common destination D via N parallel relays R n , 1≤nN performing Decode-and-Forward. No direct links from sources to destination are assumed and the discrete-time channel impulse responses from S m to R n and from R n to D are given by h m,n and g n , respectively. Frequency-selective block Rayleigh fading channels h ~ m , n and g ~ n with L h and L g i.i.d channel taps are assumed and the path loss on each hop is given by d ε such that

h m , n = d - ε 2 h ~ m , n
(1a)
Figure 1
figure 1

Topology of the considered multi-user two-hop relay system. Sources S m and relays R n are distributed equidistantly with spacings d S and d R, respectively. Relays are located directly in the middle between sources and destination.

g n = d - ε 2 g ~ n ,
(1b)

where d denotes the distance between the corresponding nodes and ε is the path loss exponent. The channel impulse responses are normalized such that the total received power depends only on the path loss but not on L h and L g, respectively, i.e., E{ h ~ m , n 2 }=E{ g ~ n 2 }=1. Also, each receiver, i.e., R n and D experiences additive white gaussian noise (AWGN) of power σ n 2 . Due to the half-duplex constraint, the transmission time can be divided into a source-relay phase in which the sources broadcast their information to the relays and a relay-destination phase in which the relays simultaneously forward the processed information of all sources to the destination. Both phases are described in detail in the subsequent paragraphs.

2.2 Source-relay phase

In the first phase, the sources simultaneously broadcast their information to the relays applying IDMA [10]. Figure 2 shows the transmitter structure of the source S m , where the binary information sequence b m F 2 L b of length L b is encoded by a code C of rate R c=R c,conv·R c,rep consisting of a serial concatenation of a convolutional code C conv of rate R c,conv and a repetition code C rep of rate R c,rep. The resulting coded sequence c m F 2 L c of length L c is interleaved by a user specific interleaver Π m resulting in the interleaved code sequence c m F 2 L c . Finally, the interleaved code bits are mapped onto symbols from the normalized alphabet A resulting in the transmit sequence x m A L x of length L x with σ x 2 =1. The symbols x m are then broadcasted to all relays.

Figure 2
figure 2

Structure of source S m : common IDMA transmitter structure consisting of channel encoder C , interleaver Π m and symbol mapper .

The received signal y n at relay R n is given by the superposition of all source signals x m convolved with the corresponding channel impulse responses h m,n plus additive white gaussian noise n n L x + L h - 1 of power σ n 2 as

y n = m = 1 M H m , n x m + n n ,
(2)

where H m , n ( L x + L h - 1 ) × L x is the convolutional matrix of h m,n . In Figure 3, the structure of relay R n is shown. First, in order to separate the user signals x m , IDMA multi-user detection (MUD) is performed using the iterative soft-RAKE algorithm [[10]]. Since for soft-RAKE detection all multipath propagations of each signal x m are resolved separately, in total M·L h different layers have to be resolved at each relay. As a useful measure for later investigations, the load on the first hop β SR is introduced. To account for the separate detection of all multipath propagations by the soft-RAKE detection, it is defined here in terms of layers as

β SR =M· L h · R c .
(3)
Figure 3
figure 3

Structure of relay R n consisting of IDMA multi-user detection (MUD) and M parallel IDMA encoding branches each containing a user specific and a relay specific interleaver in series.

By this definition, the load is not only dependent on the number of users M and the overall code rate R c , but also on the number of channel taps L h , i.e., the degree of frequency selectivity of the channel. An alternative to soft-RAKE detection is multi-layer APP detection [[18]], which avoids gaussian approximation of multi-user interference and, hence, allows for higher bandwidth efficiencies. But since the complexity of multi-layer APP detection grows exponentially with the number of users M and the number of channel taps L h , i.e., O 2 M L h , it is not suited for the investigated system.

The MUD at relay R n delivers LLRs Λ b m R n for the user information words b m . After hard decision, the estimates b ̂ m R n =Q Λ b m R n form the relay information words b m,n as

b ̂ m R n b m , n ,
(4)

where b m,n denotes the relay message at relay R n with respect to source S m . Note that due to decoding errors at the relay, the information words b m and b m,n might be different from each other. To cope with this problem, the following strategies are possible:

  • Decoding errors at the relays are not detected and the decoding at the relays is assumed to be perfect. Subsequently, all M relay messages b m,n of relay R n are forwarded to the destination. This is done for the common dIDM-STC detection.

  • Decoding errors are detected by exploiting a cyclic redundancy check (CRC) code and only correct information words, i.e., b m,n = b m , are forwarded to the destination. This is done for adaptive relaying which is discussed in more detail in Section 3.2.

  • The decoding error probability at the relays is estimated, e.g., as described in Section 4.1, and the transmit power for the relay messages is adjusted according to the decoding error probability at the corresponding relay. That means, the higher the error probability at the relay, the lower the corresponding transmit power. This is done for adaptive relaying with power allocation. This scheme is not considered further in this study, as it basically has the same problems as the common dIDM-STC detection scheme, which are described in Section 3.1.

  • Decoding errors are detected as for the adaptive relaying scheme. However, in contrast to the adaptive scheme, erroneous decoding at the relays is handled by the detector at the destination and not by the relays. Hence, all M information words b m,n are transmitted with the same power to the destination, regardless of the decoding success. Additionally, the outcomes of the CRC checks w.r.t. the sources S m are signaled to the destination where they are used later on by the new proposed detection scheme.

For non-adaptive relaying, all relay information words b m,n are encoded using the same channel code C as the sources and interleaved by the user specific interleavers Π m . In addition to the user specific interleaving, the sequences c m , n are additionally interleaved using a relay specific interleaver Π r,n , such that a unique interleaver tuple (Π m ;Π r,n ) is assigned to each of the M·N interleaved sequences c m , n ′′ across all N relays. These interleaved sequences are mapped onto symbols from the same alphabetA and summed up. Finally, a scaling by α n = 1 M ensures σ x n 2=1 independent of the number of supported users M, resulting in the relay transmit signal

x n = α n m = 1 M x m , n .
(5)

2.3 Relay-destination phase

In the second phase, the transmit signals x n A L x of all relays are broadcasted simultaneously to the destination D. Under the assumption of perfect decoding at all relays, each user message b m is transmitted from all N relays and a distributed IDM-STC is formed across the N relays. The receive signal y at the destination consists of the superposition of the relay signals x n convolved with the corresponding channel impulse responses g n plus additive white gaussian noise n L x + L g - 1 as

y= n = 1 N G n x n +n,
(6)

where G n ( L x + L g - 1 ) × L x is the convolutional matrix of g n . Again, for later investigations the load on the second hop is defined similar to ( 3) as

β RD =M·N· L g · R c .
(7)

Hence, under the assumption of equally long channel impulse responses on both hops, the load on the second hop is N times as large as on the first hop, i.e., β RD = N·β SR .

3 Common detection schemes

3.1 Common IDM-STC detector

In order to separate all M·N layers x m,n at the destination, an iterative turbo detection is applied [[8]]. Figure 4 depicts the part of the overall detector for the detection of message b m of source S m . After soft-RAKE based interference cancelation (IC) with respect to all M·N layers, relay specific interleaving is reversed Π r , n - 1 , yielding the LLRs Λ c m , n IC . Since the relays transmitted over statistically independent channels g n , the LLRs Λ c m , n IC represent statistically independent observations of c m and, hence, are summed up.

Λ c m IC = n = 1 N Λ c m , n IC .
(8)
Figure 4
figure 4

Structure of the common detection scheme at D for dIDM-STC. Shown is the specific part for detection of the information word b m of source S m .

This de-interleaving and the subsequent summation (8) can be interpreted as the actual decoding of the dIDM-STC. The sum signal Λ c m IC is then de-interleaved using the user specific interleaver Π m - 1 , such that the de-interleaved LLRs for c m are given by

Λ c m IC = Π m - 1 Λ c m IC = Π m - 1 n = 1 N Π r , n - 1 Λ c m , n ′′ IC .
(9)

Using Λ c m IC, soft-input soft-output channel decoding D is performed. The decoding consists of the decoding of the repetition code C rep which is a summation of the corresponding LLRs, followed by the decoding of the convolutional code C conv using the well-known BCJR algorithm [[19]]. The BCJR delivers LLRs Λ b m for the information bits b m as well as LLRs Λ c m for the code bits c m . In order to obtain the extrinsic information generated by the decoder, the input LLRs Λ c m IC are subtracted from the output LLRs, yielding

Λ c m ext = Λ c m - Λ c m IC .
(10)

The extrinsic information Λ c m ext is then re-interleaved by the user specific interleaver Π m followed by the corresponding relay specific interleavers Π r, n and fed back as a-priori information to the IC. At the same time, the LLRs Λ b m of the information bits b m are hard quantized, leading to the hard estimates b ̂ m =Q Λ b m . This iterative process is repeated until the CRC check of b ̂ m is correct or the maximum number of iterations N it is reached.

3.1.1 Issues

The major issue of the common detection scheme is that no information regarding the quality of the first hop transmission and the reliability of the decoding at the relays is taken into account. In contrast, it is inherently assumed that all detections at the relays are perfect, i.e., b m,n = b m , such that the first hop can be neglected for detection at the destination. Clearly, this assumption is not valid in practical systems as fading and noise lead to decoding errors at the relays which then propagate to the destination. The actual problems of the common detector with respect to erroneous decoding at the relays are twofold:

  • The summation (9) of the de-interleaved LLRs is dominated by the strongest LLRs Λ c m , n ′′ IC . This is especially a problem if one or more relays experience a weak channel on the first hop and a strong channel on the second hop, because the LLRs Λ c m , n ′′ IC only depend on the quality of the second hop but not on the first hop. Due to the weak first hop these relays are very likely to generate errors due to erroneous decoding. However, at the same time these relays dominate other relays with a weaker second hop which may have decoded correctly.

  • The second issue is the loss of information about the individual relay signals x n due to the summation ( 9) and the subsequent joint decoding. The extrinsic information Λ c m ext generated by the decoder is used as a-priori information for the next detection iteration for all relays. Thus, it is implicitly assumed that all relays transmitted the same codeword. If this is not the case, the feedback to the IC and the actual observations y are contradictory and the feedback may even degrade the performance of the IC. Hence, regarding the IC, it would be favorable to process each relay separately during the iterative detection.

3.2 Adaptive relaying

One possibility to overcome the aforementioned problems is to adaptively select only the correctly decoded messages at each relay to be forwarded to the destination while all erroneously decoded messages are not transmitted [7]]. That means, relay R n forwards only the messages of sources S m which were decoded correctly. The advantage of this strategy is that the common IDM-STC detection scheme could be applied with only marginal modifications to the system, e.g., the cyclic redundancy check (CRC) code has to be exploited by the relays in order to determine the decoding success and to adaptively select only the correctly decoded messages.

However, even erroneous relays may contribute to the overall transmission as their relay information words b m,n , depending on the number of erroneous bits, may still be highly correlated to the source information words b m . Therefore, it seems not reasonable to discard erroneously decoded messages but to forward them anyway and let the destination handle the correct as well as the erroneous messages properly. Such a detection scheme is presented in the next section.

4 Reliability-aware iterative detection (RAID)

In order to consider decoding errors at the relays within the detector at the destination, a suitable model describing the overall transmission including the decoding reliabilities of the relays is required. On the one hand, this model should be accurate enough to actually improve the detection at the destination, on the other hand it should be simple enough to avoid an excessive increase in the complexity of the detector or in the signaling overhead.

4.1 Equivalent transmission model for 1st hop transmission

Based on the ideas presented in [14],[15]], decoding errors at the relays can be described using binary symmetric channels (BSCs) with a certain crossover probability. According to this description, the relay information word b m,n in ( 4) is modeled as

b m , n = BSC m , n b m , q m , n ,
(11)

where q m,n is the bit error probability of the estimate b ̂ m R n at relay R n regarding the source information word b m . This crossover probability is zero for perfect decoding at the relay and increases as the relay’s decoding reliability decreases. Using this description, an equivalent transmission model for the transmission from the sources over the first hop to the relays, including decoding at the relays, can be derived. Figure 5 depicts such an equivalent joint model for the transmission of b m via the relays R 1 up to R n . The correlation between the source information word b m and the relay information words b m,n is described by BSC m,1 up to BSC m,N with error probabilities q m,1 up to q m,n . These error probabilities q m,n are given by

q m , n = d H ( b m , b ̂ m R n ) L b ,
(12)
Figure 5
figure 5

Equivalent transmission model for transmission of b m from S m via R 1 up to R N to D . The shaded BSC blocks represent the shaded blocks from Figures 2 and 3.

where d H (·) denotes the Hamming distance and L b is the length of the information sequence b m . Obviously, the calculation ( 12) would require perfect knowledge of b m at the relays which is not the case in practical systems. However, an estimation of q m,n using the LLRs Λ b m R n of the information bits generated by the MUD at the relay is possible [[20]]. Denoting this estimate q ̂ m , n , it holds

q ̂ m , n =E 1 1 + e | Λ b m R n | 1 L b i = 1 L b 1 1 + e | Λ b m , i R n | ,
(13)

where the expectation can be approximated by the time average due to the ergodic theorem. Note that q ̂ m , n 0 even if the decoding at the relay was correct. Hence, in case of successful decoding at the relay ACK is signaled to the destination, while unsuccessful decoding leads to the signaling of a NAK in form of q ̂ m , n . The principle of this signaling is depicted in Figure 6, where CRC m,n denotes the CRC check at relay R n regarding b m . For a more detailed discussion of the signaling refer to [[16]].

Figure 6
figure 6

Principle of error estimation and signaling at relay R N . Shown is the detection and error estimation for b m .

4.2 RAID scheme

Based on the presented equivalent transmission model, the new RAID is proposed. This detection scheme takes the decoding success (CRC m,n =ACK/NAK) of the relays as well as the error probabilities q ̂ m , n into account in order to improve the detection quality compared to the common detection scheme discussed in Section 3.1. In the following, the components of the RAID scheme, i.e., the relay grouping, the detection process and the weighted combining are discussed in detail.

4.2.1 Relay grouping

To address the second issue of the common detection strategy, i.e., the loss of information about the individual relay signals x m,n , a user specific separation of the correct relays and all erroneous relays is introduced. Since all correct relays have transmitted the same code word c m,n = c m , their LLRs can be combined after relay specific de-interleaving. All erroneous relays, however, may have transmitted pairwise different code words and, hence, are all processed separately.

Based on the decoding success (CRC m,n =ACK/NAK) with respect to one specific source S m , each relay R n is assigned to one of two disjoint groups, the group of relays which have correctly decoded the source message, i.e., b m,n = b m , and the group of relays which have not correctly decoded the source message, i.e., b m,n b m . For the sake of notational simplicity, the set R m of indices of the correct relays w.r.t. source S m and the set R ̄ m of indices of erroneous relays w.r.t. source S m are introduced

R m = { n | q m , n = 0 , 1 n N }
(14a)
R ̄ m = { n | q m , n 0 , 1 n N } .
(14b)

Obviously, the union of both sets is the set of the indices of all relays, i.e., R m R ̄ m ={1,N} . Furthermore, two indexing functions ρ m and ρ ̄ m are defined, such that

R m = { ρ m ( 1 ) , , ρ m ( I m ) } , I m = | R m |
(15)
R ̄ m = { ρ ̄ m ( 1 ) , , ρ ̄ m ( K m ) } , K m = | R ̄ m |
(16)

with ρ m (1)< ρ m (2)< ρ m ( I m ) and ρ ̄ m (1)< ρ ̄ m (2)<< ρ ̄ m ( K m ) . This means ρ m (1) up to ρ m ( I m ) represent the I m indices of the correct relays w.r.t S m and ρ ̄ m (1) up to ρ ̄ m ( K m ) represent the K m indices of the erroneous relays w.r.t S m , i.e.,

b m , ρ m ( i ) = b m , 1 i I m
(17a)
b m , ρ ̄ m ( k ) b m , 1 k K m .
(17b)

Figure 7 shows the part of the overall proposed detector which is relevant to the detection of b m . The LLRs from the IC are grouped based on the decoding success (ACK/NAK) at the relays. Since the correct relays have transmitted the same code word c m , their LLRs are summed up after relay specific de-interleaving, similar to the common detection scheme, i.e.,

Λ c m , ρ m IC = i = 1 I m Π r , ρ m ( i ) - 1 Λ c m , ρ m ( i ) ′′ IC ,
(18)
Figure 7
figure 7

Structure of the proposed RAID scheme at D for dIDM-STC. Shown is the specific part for detection of the information word b m of source S m .

and are then jointly de-interleaved by the user specific interleaver and jointly decoded (bottom part). The erroneous relays, however, have transmitted different code words and are, therefore, processed and decoded separately (top part). The goal of this first stage of the detection is the best possible estimation of the relay information words b m,n and not of the source information words b m . The estimation of the source information words is exclusively performed in the second stage of the detector.

Finally, after the last iteration, the K m +1 decoders D deliver LLRs Λ b m , ρ m for the information words of the correct relays and LLRs Λ b m , ρ ̄ ( k ) for the K m information words of the erroneous relays. The explicit decoding, hard decision and subsequent re-encoding at the relays ensures that all relays actually transmitted a valid code word which is fundamental for the validity of the joint equivalent transmission model.

4.2.2 Weighted combining

Based on the estimates for the relay information words b m,n , now an overall estimate for the source information word b m should be determined. This estimate should not only include the LLRs from the correct relays, but also the LLRs from the erroneous relays as, depending on the error probabilities q ̂ m , n , the relay information of the erroneous relays is still correlated to the source information.

The question arises, how to obtain an estimate Λ b m n for the source information b m given the estimate Λ b m , n for a specific relay information word b m,n and the corresponding error probability q ̂ m , n . How does the BSC modeling of the first hop transmission translate to the LLRs for the relay information word and the source information word? Figure 8 illustrates this relationship, where the functionW(·) needs to be found, such that

Λ b m n =W Λ b m , n , q ̂ m , n ,
(19)
Figure 8
figure 8

BSC modeling of relay information word b m,n and corresponding weighting function W ( · ) for its LLRs Λ b m , n .

with Λ b m n denoting the estimate for the source information b m taking only relay R n into account. In order to find this function, the estimate Λ b m n for an arbitrary element b m of b m is written as

Λ b m n = log p ( b m = 0 , y ) p ( b m = 1 , y ) = log P ( b m = 0 | y ) p ( y ) P ( b m = 1 | y ) p ( y ) = log P ( b m = 0 | y ) P ( b m = 1 | y ) .
(20)

By using the law of total probabilities [21]], the probabilities of the source information b m can be written w.r.t. the probabilities of the relay information b m,n as

P ( b m = 0 | y ) = P ( b m = 0 | b m , n = 0 , y ) P ( b m , n = 0 | y ) + P ( b m = 0 | b m , n = 1 , y ) P ( b m , n = 1 | y )
(21a)
P ( b m = 1 | y ) = P ( b m = 1 | b m , n = 1 , y ) P ( b m , n = 1 | y ) + P ( b m = 1 | b m , n = 0 , y ) P ( b m , n = 0 | y ) .
(21b)

The probabilities of b m given b m,n solely depend on the crossover probability q ̂ m , n of the BSC,

P ( b m = 0 | b m , n = 0 ) = P ( b m = 1 | b m , n = 1 ) = 1 - q ̂ m , n
(22a)
P ( b m = 1 | b m , n = 0 ) = P ( b m = 0 | b m , n = 1 ) = q ̂ m , n ,
(22b)

such that the estimate Λ b m n can be rewritten as (25a). Expressing the probabilities by LLRs [[22]]

P ( b m , n = 0 | y ) = e Λ b m , n 1 + e Λ b m , n
(23)
P ( b m , n = 1 | y ) = 1 1 + e Λ b m , n
(24)

leads to (25b) and after some algebraic manipulations to (25c). Thus, the desired functionW(·) is finally found to be

Λ b m n = log P ( b m , n = 0 | y ) ( 1 - q ̂ m , n ) + P ( b m , n = 1 | y ) q ̂ m , n P ( b m , n = 1 | y ) ( 1 - q ̂ m , n ) + P ( b m , n = 0 | y ) q ̂ m , n
(25a)
= log e Λ b m , n 1 + e Λ b m , n ( 1 - q ̂ m , n ) + 1 1 + e Λ b m , n q ̂ m , n 1 1 + e Λ b m , n ( 1 - q ̂ m , n ) + e Λ b m , n 1 + e Λ b m , n q ̂ m , n
(25b)
= log e Λ b m , n / 2 ( 1 - q ̂ m , n ) + e - Λ b m , n / 2 q ̂ m , n e - Λ b m , n / 2 ( 1 - q ̂ m , n ) + e Λ b m , n / 2 q ̂ m , n
(25c)
W Λ b m , n , q ̂ m , n = log e Λ b m , n / 2 ( 1 - q ̂ m , n ) + e - Λ b m , n / 2 q ̂ m , n e - Λ b m , n / 2 ( 1 - q ̂ m , n ) + e Λ b m , n / 2 q ̂ m , n ,
(26)

whereW Λ b m , n , q ̂ m , n is a shorthand notation for applying ( 25c) to every element of Λ b m , n .

In (25c) the error probability q ̂ m , n of the BSC obviously leads to a weighting of the estimates of the relay information word given by Λ b m , n . For completely uncorrelated b m,n and b m , i.e., q ̂ m , n =0.5 , the relay transmitted no information regarding b m and, hence, Λ b m n=0. However, as q ̂ m , n decreases, Λ b m n tends to Λ b m , n giving an estimate of b m with respect to the information from relay R n .

Since all transmit channels are statistically independent, the observations from all relays can be summed up resulting in the estimate

Λ b m = Λ b m , ρ m + k = 1 K m W Λ b m , ρ ̄ m ( k ) , q ̂ m , n
(27)
= Λ b m , ρ m + k = 1 K m Λ b m ρ ̄ m ( k ) ,
(28)

where Λ b m , ρ m is the unweighted estimate from the correct relays. Finally, hard quantization leads to the overall estimate b ̂ m =Q Λ b m for the source message b m .

4.3 Pseudo code

In order to facilitate the comprehension of the proposed RAID scheme, a pseudo code for the overall detection process is given in Algorithm 1. The algorithm requires the set of all CRC check results {CRC m,n }, the set of all error probabilities q ̂ m , n , the set of all channel impulse responses from the relays to the destination { g n }, the sets of all relay specific and user specific interleavers { Π r, n } and { Π n } and the noise variance σ n 2 .

5 Algorithm 1: The RAID algorithm

After the grouping, as described in Section 4.2.1 (lines 3–14), the iterative detection process is performed (lines 15–35). Besides some interleaving and de-interleaving operations, it mainly consists of the softRAKE detection (line 18), the combining of the information from the correct relays (line 22) and the APP-decoding (lines 27–28). Finally, after the detection, the weighting (line 37) and combining (line 39), as described in Section 4.2.2, is performed. The hard decision (line 41) leads to the hard estimates of the user information words b ̂ m .

5.1 Computational complexity

The computational complexity of the presented detection schemes, i.e., cDF, aDF, and RAID, mainly differs in the number of APP-decodings per frame. Hence, the number of APP-decodings per frame is a useful measure in order the compare the complexity of the schemes. Table 1 gives an overview of the number of decodings per frame. As can be seen, for cDF and aDF one APP-decoding per user, frame and iteration is required, independent of the number of successful relays. For RAID, however, the number of APP-decodings depends on the number of successful relays. In the best case, i.e., all relays were successful, only one decoding operation per iteration and user is required, leading to the same complexity as cDF and aDF. In the worst case, every relay message is decoded separately, resulting in a complexity N times as high as for cDF and aDF. Note that the aDF scheme would fail in the worst case scenario, while cDF and RAID might still achieve correct decoding.

Table 1 Comparison of the computational complexity of cDF, aDF, and RAID

6 Numerical results

For numerical investigations, a two-hop relay system with M sources S m ,N=4 parallel relays R n and one common destination D as depicted in Figure 1 is considered. The distance between the central source and the destination is normalized to d SD =1 and the inter-relay distance is set so d R =0.2. Frequency-selective block Rayleigh fading with L=L h = L g i.i.d. channel taps is assumed on both hops and the path loss exponent is set to ε=3. For channel coding, a combination of the non-recursive half-rate (5,7) 8 convolutional code and a repetition code of rate R c,rep is applied and the codeword length is set to L c =1024 codebits. The QPSK alphabet A with σ x 2 =1 is chosen and the relay transmit signals are normalized such that σ x n 2=1 regardless of the number of supported users M. That way, all schemes have the same power cost for a given number of users M, making the comparisons fair. For detection at the relays and at the destination N it =10 iterations are performed. Initially, the error probabilities q m,n are assumed to be perfectly known at the destination.

6.1 Single user

First, a single user system is considered, i.e., M=1. Figure 9 depicts the frame error rate (FER) at the destination for the common detection scheme (cDF) and the proposed RAID scheme for different code rates R c,rep over flat ( L=1, solid) and frequency selective channels (L=4, dashed). As reference, also the adaptive relay system is given (aDF). Starting with the system without repetition coding, i.e., R c,rep =1, it can be seen, that the RAID scheme clearly outperforms the common scheme for flat, as well as for frequency selective channels. The adaptive scheme, however, performs significantly better than the RAID scheme. Also, all three detection schemes lead to an error floor for frequency selective channels.

Figure 9
figure 9

FER at the destination for common detection, RAID and adaptive relaying and different coderates R c,rep of the repetition code. M=1 user. Solid: L=1 channel taps, dashed: L=4 channel taps.

Since soft-RAKE-detection is applied, overall N·L layers have to be separated at the destination. In case of L=4 this corresponds to a load of β RD =8. Hence, in this scenario, the system is eight times overloaded. Clearly, a separation of all layers fails at this high load even for high signal-to-noise ratios (SNRs) resulting in the observed error floor. Even for flat fading the system is significantly overloaded, i.e., β RD =2. In this case, the adaptive scheme outperforms the RAID scheme, since the system is interference limited and adaptively switching erroneous relays off decreases the load and leads to a better separation of the layers at the destination.

Introducing a repetition code of rate R c,rep = 1 2 , as depicted in Figure 9b, reduces the system load to β RD =1 for the flat fading case and β RD =4 for the frequency selective fading case. The RAID as well as the adaptive scheme now perform significantly better than the common scheme. As can be seen, the advantage of the adaptive scheme has vanished. For flat fading the RAID scheme even performs slightly better than the adaptive scheme. In this case, all layers can be successfully separated by the IC. However, while the adaptive scheme does not exploit erroneous relays, the proposed RAID scheme leads to a slightly better performance by also taking these relays into account. For the frequency selective channels, however, the load is still high, and the adaptive scheme leads to a marginally better performance than RAID.

Further decreasing the code rate of the repetition code to R c,rep = 1 4 , as in Figure 9c, reduces the load to β RD = 1 2 for flat fading and β RD =2 for frequency selective fading. Since the system is not interference limited anymore, this results in a better performance for RAID compared to the adaptive scheme even for the frequency selective case.

In Figure 10, the corresponding end-to-end throughput η, assuming a selective repeat automatic repeat request (ARQ) protocol, is shown. For the given system parameters, i.e., QPSK modulation and a half-rate convolutional code, it reads

η = log 2 | A | · R c , conv · R c , rep · 1 - FER = R c , rep · 1 - FER ,
(29)
Figure 10
figure 10

Achieved end-to-end throughput for all strategies and different coderates R c,rep of the repetition code. M=1 user.

where|A| denotes the cardinality of A . While the system without repetition coding clearly leads to the worst performance in terms of FER for all three schemes, it outperforms the other systems in terms of throughput above approx. 1 σ n 2 =-5dB for aDF and 1 σ n 2 =-3dB to 1 σ n 2 =-2dB for RAID and cDF. In the high SNR region the throughput clearly tends to the spectral efficiency R c,rep of the system. Interestingly, for R c,rep =1 and L=4 the common scheme achieves a higher throughput than RAID up to 1 σ n 2 =-1dB . Again, the reason for this behavior is the high load in the system and the very low SNR per layer the detector experiences at this point. The LLRs delivered by the IC are, hence, very small. In this case, it is better to add all available LLRs up, trying to increase the signal level and achieve successful joint decoding than to separate the layers according to the decoding success of the relays and thereby keeping the signal levels low. Above 1 σ n 2 =-1dB , the signal levels are sufficiently high and the RAID outperforms the common scheme. The same behavior can be seen for R c , rep = 1 2 and L=4 but with much smaller characteristic. This is due to the decoding of the repetition code, which corresponds to the summation of two subsequent LLRs. The signal levels after IC are hereby increased sufficiently and the RAID achieves almost the same performance as cDF in the lower SNR region up to approx. 1 σ n 2 =-8dB . Above this SNR, again RAID clearly outperforms cDF. Finally, for R c , rep = 1 4 RAID always performs better than cDF, as the observed behavior is completely avoided for higher code rates R c,rep .

6.2 Estimation of error probability q m,n

While the previously shown results for the RAID scheme were all based on perfect knowledge of q m,n , subsequently the impact of the usage of its estimation q ̂ m , n given in ( 13) is investigated. Figure 11 shows samples of the bit error probability q m,n and its estimate q ̂ m , n for different frame sizes L b in a double logarithmic representation. These samples were obtained by Monte Carlo simulations, i.e., for transmissions at varying SNR the resulting q m,n and the corresponding q ̂ m , n were calculated and plotted. The solid line indicates equality, while a mark above the line means a too high and a mark below the line a too low estimate. First, in the plots the quantized nature of q m,n can be seen. Since only integer numbers of erroneous bits can occur, q m,n is limited to the values 1 L b , 2 L b ,. For L b =64, e.g., this is 0.0156,0.0312,…, which corresponds to the marks in the plot. Clearly, for larger frame lengths L b , lower error probabilities are possible, e.g., 1 256 =0.0039 for L b =256 and 1 2560 =0.004 for L b =2560. In addition, the size of the quantization steps gets smaller, as it is also given by 1 L b . On the other hand, the estimate q ̂ m , n is continuously distributed as the LLRs Λ b m R n the estimate is based on, are continuously distributed.

Figure 11
figure 11

Error probability q m,n and estimation q ̂ m , n using LLRs Λ b m R n . Flat fading channels. R c,rep = 1 2 .

Apparently, also the quality of the estimate strongly depends on the frame size. While for a frame size of L b =64 information bits the estimate already significantly deviates from the true value for error rates of 10 -1 , the estimate improves for larger frame lengths. The reason for this behavior is the approximation in ( 13). Since the expectation can only be estimated using the mean over all LLRs within one frame, the estimate clearly improves as the frame length increases.

Another interesting observation is the behavior of the estimates q ̂ m , n for small error probabilities. The lower the error probability q m,n is, the stronger deviates the estimate q ̂ m , n from q m,n . Again, the reason for this is the approximation in ( 13). Strictly speaking, the expectation has to be calculated with respect to the overall distribution of Λ b m R n , i.e., all events which lead to one specific q m,n need to be taken into account in order to obtain a valid estimation. However, since only one frame with a specific channel realization is available at the relay, the influences of the channel are neglected in the approximation of the estimate, leading to the observed deviation for single events. Clearly, this is also true for larger error rates q m,n . However, due to the logarithmic representation, the relative deviation is much smaller.

Finally, it can be seen from Figure 11, that for very high error probabilities, (13) leads to an underestimation, while for lower error probabilities q m,n is slightly overestimated. This leads to an overall more conservative behavior of the system due to the weighting ( 27).

In Figure 12, the achieved FERs at the destination using RAID with q m,n or its estimate q ̂ m , n are depicted. Figure 12a) shows the FERs for both cases for flat (L=1, solid) and frequency selective (L=4, dashed) fading channels. While both methods lead to very similar results, using the estimate q ̂ m , n instead of q m,n results in a small performance degradation. In Figure 12b, the same results are plotted again using a double logarithmic representation, i.e., each mark denotes the achieved FER for both methods at one specific SNR. All marks tend to lay above the equality line, indicating slightly higher FERs using the estimate q ̂ m , n compared to q m,n . In Figure 12c) the same comparison is drawn using frames of L b =256 information bits, corresponding to L c =1024 code bits. Obviously, although the estimate q ̂ m , n still significantly deviates from the true q m,n for this frame size, the estimation ( 13) is sufficiently accurate as both methods lead to almost exactly the same error rates at the destination.

Figure 12
figure 12

FER at destination using q m,n and estimate q ̂ m , n for RAID. R c , rep = 1 2 .

6.3 Multiple users

Finally, the performance evaluations are extended to multi-user scenarios. Specifically, the given topology is extended to M=2 and M=4 sources, respectively, with an inter-source spacing of d S =0.1. Figure 13 shows the results for a system with a repetition code of rate R c,rep = 1 4 . As a benchmark, the FERs at the destination for genie relays are given, i.e., the relays always decode perfectly and errors only occur on the second hop. For the genie relays, an increase of number of sources M from 1 to 2 and from 2 to 4, respectively, basically results in a SNR loss of 3 dB as the relay power is independent of the number of supported users M and, hence, a doubling of the number of users M leads to a halving of the power per user and relay. For L=4 and M=4 users, as depicted in Figure 13b, an error floor due to the high load of β RD = M·N·L·R c =8 can be observed. For cDF and RAID the gaps between the curves for different user numbers are significantly smaller than 3 dB. This indicates that the overall performance is primarily dominated by the performance on the first hop and, hence, by the decoding at the relays. In fact, for cDF and L=1 a typical IDMA behavior [10]] as applied on the first hop, can be observed. With increasing system load the performance of the system gets worse but still converges to the single user bound above a certain SNR threshold.

Figure 13
figure 13

FER at destination for RAID and cDF for different numbers of users M=1 (solid), M=2 (dashed), M=4 (dashdotted). R c,rep = 1 4 .

In Figure 14, a non-overloaded multi-user system with a repetition code of rate R c,rep = 1 32 is given. Principally, for this system the same observations as for the system in Figure 13 can be made. However, even for M=4 users and frequency selective fading (L=4), corresponding to a load of β RD =1, no error floor occurs. For both systems the RAID scheme clearly outperforms the common scheme. But as the number of users increases, the overall performance is more and more dominated by the detection at the relays leading to a decreasing performance gap between both schemes.

Figure 14
figure 14

FER at the destination for RAID and cDF for different numbers of users: M=1 (solid), M=2 (dashed), M=4 (dashdotted). R c,rep = 1 32 .

As could be seen, frequency selectivity has a strong impact on the overall performance. While for given system parameters convergence of the detection process may be successful for flat channels, it might fail for frequency selective channels. This behavior could be observed in, e.g., Figure 9a and is mainly caused by the use of soft-RAKE detection. To overcome these drawbacks, the code rate of the repetition code can be decreased as it was done in Figure 9b,c. However, a lower code rate leads to a lower spectral efficiency which is not always desirable. Another possibility is the application of a different interference cancelation scheme like minimum mean square error (MMSE) based Interference Cancelation. In contrast to soft-RAKE detection, the MMSE detection resolves all multipath propagations of each signal jointly and, thus, does not suffer from frequency selectivity. However, since the MMSE based Interference Cancelation requires matrix inversions, its complexity is much higher than the complexity of the soft-RAKE detection [23]. Finally, a third possibility which avoids the drawbacks of both aforementioned methods is the combination of IDM-STCs and OFDM as it was investigated in [16]. The resulting OFDM-IDM-STCs allow for soft-RAKE detection in frequency domain independent of the number of channel taps. Since the detection of OFDM-IDM-STCs only requires a modification of the Interference Cancelation compared to the detection of IDM-STCs, the principles of the new proposed RAID scheme can directly be adopted for detection of OFDM-IDM-STCs.

7 Conclusions

In this article, distributed interleave-division multiplexing space-time codes (dIDM-STC) have been applied for multi-user two-hop relay systems. After introducing an equivalent transmission model for the source-relay transmission, the novel reliability-aware iterative detection scheme (RAID) was presented which explicitly takes the decoding success as well as the decoding reliabilities of the relays into account for detection at the destination. The proposed RAID scheme was shown to achieve substantial performance gains compared to the common detection scheme which neglects the reliability of the transmission on the first hop and implicitly assumes perfect decoding at the relays. Due to the optimal exploitation of all available information from the correct as well as from the erroneous relays, RAID was shown to even outperform the adaptive relay scheme in non-overloaded systems. Moreover, the impact of the estimation of the bit error probabilities at the relays using LLRs was investigated. It was shown that using these estimates for the RAID leads to almost the same end-to-end performance than the usage of perfect knowledge. Only for small frame sizes slightly higher frame error rates using the estimates could be observed, but for larger frames, practically no differences in terms of frame error rates could be seen. Finally, the combination of IDM-STCs and OFDM was suggested to better cope with frequency selectivity. For the resulting OFDM-IDM-STCs the principles of the RAID scheme can directly be applied in frequency domain.

References

  1. Foschini G, Gans M: On limits of wireless communications in a fading environment when using multiple antennas. Wirel. Personal Commun 1998, 6(3):311-335. 10.1023/A:1008889222784

    Article  Google Scholar 

  2. Telatar E: Capacity of multi-antenna Gaussian channels. Eur. Trans. Telecommun 1999, 10(6):585-595. 10.1002/ett.4460100604

    Article  Google Scholar 

  3. Dohler M: Virtual Antenna Arrays, PhD thesis, University of London. 2003.

    Google Scholar 

  4. Alamouti S: A simple transmit diversity technique for wireless communications. IEEE. J. Sel. Areas Commun 1998, 16(8):1451-1458. 10.1109/49.730453

    Article  Google Scholar 

  5. Tarokh V, Seshadri N, Calderbank A: Space-time codes for high data rate wireless communication: performance criterion and code construction. IEEE Trans. Inf. Theory 1998, 44(2):744-765. 10.1109/18.661517

    Article  MathSciNet  MATH  Google Scholar 

  6. Dohler M, Lefranc E, Aghvami H: Space-time block codes for virtual antenna arrays. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Portugal: Lisbon; 2002:414-417.

    Chapter  Google Scholar 

  7. Laneman J, Wornell G: Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Trans. Inf. Theory 2003, 49(10):2415-2425. 10.1109/TIT.2003.817829

    Article  MathSciNet  MATH  Google Scholar 

  8. Leung W, Wu K, Ping L: Interleave-division-multiplexing space-time codes. In IEEE Vehicular Technology Conference (VTC-Spring). South Korea: Jeju; 2003:1094-1098.

    Google Scholar 

  9. Wu K, Ping L: A quasi-random approach to space-time codes. IEEE Trans. Inf. Theory 2008, 54(3):1073-1085.

    Article  MathSciNet  MATH  Google Scholar 

  10. Ping L, Liu L, Wu K, Leung W: Interleave-division multiple-access. IEEE Trans. Wirel. Commun 2006, 5(4):938-947.

    Article  Google Scholar 

  11. Fang Z, Li L, Wang Z: An interleaver-based asynchronous cooperative diversity scheme for wireless relay networks. In IEEE International Conference on Communications (ICC). China: Beijing; 2008:4988-4991.

    Google Scholar 

  12. Weitkemper P, Wübben P, Kammeyer KD: Distributed interleave-division multiplexing space-time codes for coded relay networks. In IEEE International Symposium on Wireless Communication Systems 2009 (ISWCS). Italy: Siena; 2009:488-492.

    Chapter  Google Scholar 

  13. Wang T, Cano A, Giannakis G, Laneman J: High-performance cooperative demodulation with decode-and-forward relays. IEEE Trans. Commun 2007, 55(7):1427-1438.

    Article  Google Scholar 

  14. Thobaben R: On distributed codes with noisy relays. In Asilomar Conference on Signals, Systems and Computers. CA, USA: Pacific Grove; 2008:1010-1014.

    Google Scholar 

  15. Sneessens H, Louveaux J, Vandendorpe L: Turbo-coded decode-and-forward strategy resilient to relay errors. In IEEE International Conference on Acoustics, Speech and Sinal Processing (ICASSP). NV, USA: Las Vegas; 2008:3213-3216.

    Google Scholar 

  16. Lenkeit F, Bockelmann C, Wübben D, Dekorsy A: OFDM-IDM space-time coding in two-hop relay-systems with error-prone relays. In 16th International ITG Workshop on Smart Antennas (WSA). Germany: Dresden; 2012:97-104.

    Google Scholar 

  17. Lenkeit F, Wübben D, Dekorsy A: An improved detection scheme for distributed IDM-STCs in relay-systems. In IEEE 76th International Vehicular Technology Conference (VTC-Fall). Canada: Québec; 2012:1-5.

    Google Scholar 

  18. Noemm M, Wo T, Hoeher P: Mutilayer APP detection for IDM. Electron. Lett 2010, 46: 96-97. 10.1049/el.2010.1755

    Article  Google Scholar 

  19. Bahl L, Cocke J, Jelinek F, Raviv J: Optimal decoding of linear codes for minimizing symbol error rate. IEEE Trans. Inf. Theory 1974, 20(2):284-287.

    Article  MathSciNet  MATH  Google Scholar 

  20. Land I: Reliability information in channel decoding. PhD thesis, Kiel, Germany. 2005.

    Google Scholar 

  21. Papoulis A, Pillai S: Probability, Random Variables, and Stochastic Processes. New York: Mc Graw Hill; 2002.

    Google Scholar 

  22. Hagenauer J, Offer E, Papke L: Iterative decoding of binary block and convolutional codes. IEEE Trans. Inf. Theory 1996, 42(2):429-445. 10.1109/18.485714

    Article  MATH  Google Scholar 

  23. Kusume K, Bauch G, Utschick W: IDMA versus CDMA: detectors, performance and complexity. In IEEE Global Telecommunications Conference (Globecom). USA: Honolulu, HI; 2009:1-8.

    Google Scholar 

Download references

Acknowledgements

This study was supported in part by the German Research Foundation (DFG) under grant KA 841/20-2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Florian Lenkeit.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Lenkeit, F., Wübben, D. & Dekorsy, A. Reliability-aware iterative detection scheme (RAID) for distributed IDM space-time codes in relay systems. EURASIP J. Adv. Signal Process. 2013, 70 (2013). https://doi.org/10.1186/1687-6180-2013-70

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-6180-2013-70

Keywords