2022
DOI: 10.1109/lwc.2021.3126871
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Block UAMP-Based Detection for OTFS With Rectangular Waveform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…For the nonlinear method, we consider three message-passing based equalization methods, which are marked as "mp," "uamp," and "vamp" in the figures, respectively. For the sphere-decoding based methods, we consider the three versions which are marked as "sd0," "sd1," and "sd2" in the 3 "uamp" The UAMP method [13] 4 "vamp" The VAMP method [14] 5 "sd0-bf" The proposed Algorithm 1 with breadth-first tree-search 6 "sd0-df" The proposed Algorithm 1 with depth-first tree-search 7 "sd0-mf" The proposed Algorithm 1 with metric-first tree-search 8 "sd1-bf" The proposed Algorithm 2 with breadth-first tree-search 9 "sd2-bf" The proposed Algorithm 3 with breadth-first tree-search figures, respectively. Additionally, we consider all these treesearch strategies and mark them as "b," "df," and "mf" in the figures, respectively.…”
Section: Simulation Settingsmentioning
confidence: 99%
See 2 more Smart Citations
“…For the nonlinear method, we consider three message-passing based equalization methods, which are marked as "mp," "uamp," and "vamp" in the figures, respectively. For the sphere-decoding based methods, we consider the three versions which are marked as "sd0," "sd1," and "sd2" in the 3 "uamp" The UAMP method [13] 4 "vamp" The VAMP method [14] 5 "sd0-bf" The proposed Algorithm 1 with breadth-first tree-search 6 "sd0-df" The proposed Algorithm 1 with depth-first tree-search 7 "sd0-mf" The proposed Algorithm 1 with metric-first tree-search 8 "sd1-bf" The proposed Algorithm 2 with breadth-first tree-search 9 "sd2-bf" The proposed Algorithm 3 with breadth-first tree-search figures, respectively. Additionally, we consider all these treesearch strategies and mark them as "b," "df," and "mf" in the figures, respectively.…”
Section: Simulation Settingsmentioning
confidence: 99%
“…So the complexity of each iteration of the “mp” method is actually scriptOfalse(N2M2Qfalse)$\mathcal {O}(N^2M^2Q)$ for the parameter configurations considered in this work. For the “uamp” or “vamp” method, the complexity of each iteration is scriptOfalse(NM2+NMQfalse)$\mathcal {O}(NM^2 + NMQ)$ [13, 14]. We compare the complexity functions (that is, the parts in the parentheses) of these methods in Figure 7, where the horizontal axis represents the number of iterations, and the parameters are M=16$M=16$, N=4$N=4$, Q=16$Q=16$, and K=100$K=100$.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Next-generation wireless communication systems are expected to communicate reliably via high-mobility channels even in the face of severe inter-carrier interference (ICI) and inter-symbol interference (ISI) [5], [17]. With this in mind, orthogonal time-frequency space (OTFS) modulation has been proposed as an attractive candidate for next-generation wireless communications [4], [8], [13], [19], where the information bits are modulated in the delay-Doppler (DD) domain. Then the two-dimensional orthogonal basis functions of inverse fast Fourier transform (IFFT) and FFT are employed along in the delay and Doppler domains, respectively, for spreading the DD domain symbols across the whole time-frequency (TF) domain.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, in [11], an improved approximate message passing (AMP) detection algorithm was conceived, which outperforms the traditional AMP algorithm. In [12], a multi-block unitary approximate message passing (UAMP) detection algorithm was designed by partitioning a large timedomain channel matrix into several sub-matrices. In [13], a maximal ratio combining receiver was proposed to blockwisely detect symbols.…”
Section: Introductionmentioning
confidence: 99%