Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A RECEIVER, A PLURALITY OF TRANSMITTERS, A METHOD OF RECEIVING USER DATA FROM MULTIPLE TRANSMITTERS, AND A METHOD OF TRANSMITTING USER DATA
Document Type and Number:
WIPO Patent Application WO/2017/032625
Kind Code:
A1
Abstract:
A method is provided of receiving user data from multiple transmitters, the user data from each transmitter having been encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising the steps of: (i) receiving the signal,(ii) calculating coefficients of linear combinations of the codewords from the multiple transmitters,(iii) calculating a scaling factor to be applied to the signal based on the coefficients, (iv) applying the scaling factor to the signal to provide a linear combination of the codewords, (v) decoding the linear combination of the codewords based on channel state information to obtain an optimal independent linear combination of user data, (vi) repeating steps (ii), (iii) (iv)and (v) to obtain at least as many optimal independent linear combinations as the number of transmitters, and recovering the user data from the optimal independent linear combinations.

Inventors:
FANG DONG (IE)
KUCERA STEPAN (IE)
CLAUSSEN HOLGER (IE)
Application Number:
PCT/EP2016/069324
Publication Date:
March 02, 2017
Filing Date:
August 15, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ALCATEL LUCENT (FR)
International Classes:
H04J13/00; H04L1/00
Other References:
H. NIKOPOUR; H. BALIGH: "Sparse code multiple access,'' in Personal Indoor and Mobile Radio Communications (PIMRC", 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON, 2013, pages 332 - 336, XP055227113
N. SOMMER; M. FEDER; O. SHALVI: "Low-density lattice codes", INFORMATION THEORY, IEEE TRANSACTIONS ON, vol. 54, no. 4, April 2008 (2008-04-01), pages 1561 - 1585, XP080280916
H. NIKOPOUR; H. BALIGH: "Personal Indoor and Mobile Radio Communications (PIMRC", 2013, 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON, article "Sparse code multiple access", pages: 332 - 336
N. SOMMER; M. FEDER; O. SHALVI: "Information Theory", vol. 54, April 2008, IEEE TRANSACTIONS ON, article "Low-density lattice codes", pages: 1561 - 1585
Attorney, Agent or Firm:
SARUP, David Alexander (GB)
Download PDF:
Claims:
Claims:

1. A method of receiving user data from multiple transmitters, the user data from each transmitter having beenencoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising the steps of:

(i) receiving the signal,

(ii) calculating coefficients of linear combinations of the codewords from the multiple transmitters,

(iii) calculating a scaling factor to be applied to the signal based on the coefficients,

(iv) applying the scaling factor to the signal to provide a linear combination of the codewords,

(v) decoding the linear combination of the codewords based on channel state information to obtain an optimal independent linear combination of user data,

(vi) repeating steps (ii), (iii) (iv)and (v) to obtain at least as many optimal independent linear combinations as the number of transmitters, and

recovering the user data from the optimal independent linear combinations.

2. A method of receiving according to claim 1, in which the calculation of the scaling factor comprises applying a minimum mean square error, MMSE, criterion to minimise variance of effective noise.

3. A method of receiving according to claim 1 or claim 2, in which the calculation of the coefficients comprises maximising a virtual rate of the linear combination of codewords. 4. A method according to any preceding claim, in which the decoding linear combinations comprises iterative cycles, each cycle comprising calculating a variable node message and calculating a check node message.

5. A method according to claim 4, in which obtaining each optimal independent linear combination comprises, after the final iteration, estimating probability density functions of codeword elements.

6. A method according to any preceding claim, in which the linear combination of codewords is itself a valid codeword of the Low Density Lattice.

7. A method according to any preceding claim in which the recovering user data from the optimal independent linear combinations comprises taking a pseudo-inverse of a matrix of coefficients of the optimal independent linear combinations.

8. A method according to any preceding claim, in which the transmitters are user terminals for cellular wireless telecommunications.

9. A receiver configured to receive user data from multiple transmitters, the user data from each transmitter having being encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at the receiver, the receiver comprising:

a receiving stage configured to receive the signal;

an iterative processing stage configured to provide at least as many optimal independent linear combinations as the number of transmitters, the iterative processing stage comprising:

a processor configured to calculate coefficients of linear combinations of the codewords from the multiple transmitters,

a processor configured to calculate a scaling factor to be applied to the signal based on the coefficients,

a processor configured to apply the scaling factor to the signal to provide a linear combination of the codewords, and

a decoder configured to estimate an optimal linear combination of user data based on channel state information and the linear combination of the codewords; and the receiver also comprises a recovery stage configured to recover the user data from the optimal independent linear combinations.

10. A receiver according to claim 9, which is a base station for cellular wireless communications .

1 1. A receiver according to claim 9 or claim 10, in which the decoder is a Single- Input Single-Output, SISO, decoder. 12. A method of transmitting user data as codewords of a Low Density Lattice, wherein each transmitter encodes its user data into a respective codeword for transmission and transmits the codeword on a carrier signal over air; wherein a plurality of the transmitters use a shared Low Density Lattice codebook for the encoding. 13. A method of transmitting according to claim 12, in which the transmitters are user terminals for wireless cellular telecommunications.

14. A plurality of transmitters configured to transmit towards a receiver respective data as codewords of a Low Density Lattice, wherein each transmitter encodes its respective data into a respective codeword for transmission and transmits the codeword via a carrier signal over air; wherein the plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.

Description:
A RECEIVER, A PLURALITY OF TRANSMITTERS, A METHOD OF RECEIVING USER DATA FROM MULTIPLE TRANSMITTERS, AND A

METHOD OF TRANSMITTING USER DATA

Field of the Invention

The present invention relates to telecommunications, in particular to wireless telecommunications.

Description of the Related Art

There is a drive towards greater capacity beyond what is available in 3G and

4G systems. As shown in Figure 1, when signal to interference/noise ratio (SINR) is high, there is a substantial gap between the capacity possible if not limited by the modulation scheme used (in other words the Shannon Bound) and the capacities available using the modulations schemes (QPSK, 8PSK, 16QAM) available in 4G networks

Fifth generation (5G) wireless networks are now under development with the aim of better quality of service, higher data throughput and lower latency. To this end, Third Generation Partnership Project (3 GPP) telecommunications standards bodies are targeting unprecedentedly high capacity densities, for example of up to 25 Gbits/second/square kilometre. In 3 GPP there are discussions about 5G radio access technology, in the context of which a radio access technology and physical layer waveform for uplink communications is proposed based on sparse code multiple access (SCMA), see H. Nikopour and H. Baligh, "Sparse code multiple access," in Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on, 2013, pp. 332-336. The known SCMA encoder is shown in Figure 2.

In this SCMA approach, each user's binary data is mapped onto an n- dimensional real or complex- valued codeword that is then transmitted by using multiple physical resources (for example n symbol periods, n OFDM subcarriers or n antennas). Also, each user uses a distinct codebook (a set of codewords that can be understood as a multidimensional constellation which is derived from a lattice based on a sparse code. Furthermore, joint multiuser detection is used to distinguish individual codewords of different users.

The lattice codebook of this known SCMA scheme is generated from the Cartesian product of several independent QAM constellations. Summary

The reader is referred to the appended independent claims. Some preferred features are laid out in the dependent claims.

An example of the present invention is a method of receiving user data from multiple transmitters, the user data from each transmitter having been encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising the steps of:

(i) receiving the signal,

(ii) calculating coefficients of linear combinations of the codewords from the multiple transmitters,

(iii) calculating a scaling factor to be applied to the signal based on the coefficients,

(iv) applying the scaling factor to the signal to provide a linear combination of the codewords,

(v) decoding the linear combination of the codewords based on channel state information to obtain an optimal independent linear combination of user data,

(vi) repeating steps (ii), (iii) (iv) and (v) to obtain at least as many optimal independent linear combinations as the number of transmitters, and

recovering the user data from the optimal independent linear combinations.

Preferred embodiments provide a multi-user medium access based on low density lattice coding. An approach to multi-user medium access is proposed based on multi-dimensional low density lattice codes, which we call low density lattice multiple access (LDLMA). Preferred embodiments use a low-density lattice code (LDLC) as a basis for data encoding and medium access, in which a multi-dimensional constellation (referred to as a lattice) derived from the LDLC allows network users to

asymptotically approach Shannon capacity.

Preferred embodiments use the same LDLC lattice codebook for encoding the binary data of all network users. Accordingly, the receiver receives a combination of all transmitted codewords. Since all users use the same lattice, the received linear combination of multiple codewords is also an element of the lattice codebook employed. Thus, the receiver only needs to decode linear combinations of users' LDLC codewords rather than separating them as would be required in known joint detection schemes.

In preferred embodiments, a single-input-single-output (SISO) LDLC decoder may perform such decoding by exploiting the posterior probability of linearly combined codewords in an iterative manner, which results in a linear decoding complexity even when the number of users is large.

In preferred embodiments, the individual codewords of distinct network users are detected by estimating the best combination coefficients subject to the knowledge of channel state information and the received signal.

Preferred embodiments provide a 5G access technology which we refer to as LDLMA, in which a multi-dimensional lattice constellation is used for encoding user data. The lattice constellation is constructed from the low-density lattice code

(LDLC).

In preferred embodiments LDLMA may be implemented in either or both of uplink and downlink. Especially in the downlink, a SISO decoder with linear complexity is usable which reduces the hardware required in a mobile handset and saves battery energy of the handset.

Some preferred embodiments have the advantages that users use the same lattice codebook to encode their data, the low-density lattice has a superior shaping gain and there is less decoding complexity. For example, as mentioned above the lattice codebook of the known SCMA scheme is generated from the Cartesian product of several independent QAM constellations. In contrast to this the Low-Density Lattice is a natural lattice which does not require any transformation from an existing 2-dimensional lattice such as PSK or QAM. Hence it has a superior shaping gain as compared to the multidimensional lattice constellation employed in the known SCMA approach.

Preferred embodiments have linear decoding complexity. In contrast to the known SCMA scheme, preferred embodiments do not require a base station to distinguish each user's codeword by using joint multiuser detection. Instead, the base station estimates the best linear combination of users' codewords and retrieves individual user data by solving a set of linear equations for the estimated best coefficients. The base station does not need to separate each user's codeword, hence a single-in-single-out (SISO) decoder is sufficient. This significantly reduces the decoding complexity compared with the joint multiuser detection used in the known SCMA approach. Preferably, the calculation of the scaling factor comprises applying a minimum mean square error (MMSE) criterion to minimise variance of effective noise.

Preferably, the calculation of the coefficients comprises maximising a virtual rate of the linear combination (t) of codewords.

Preferably, the decoding the linear combinations comprises iterative cycles, each cycle comprising calculating a variable node message and calculating a check node message. Preferably, obtaining each optimal independent linear combination of user data comprises, after the final iteration, estimating probability density functions of codeword elements.

Preferably, the linear combination of codewords is itself a valid codeword of the Low Density Lattice.

Preferably the recovering user data from the optimal independent linear combinations comprises taking a pseudo-inverse of a matrix of coefficients of the optimal independent linear combinations.

Preferably the transmitters are user terminals for cellular wireless

telecommunications. Examples of the present invention also relates to corresponding receiver.

An example of the present invention relates to a receiver configured to receive user data from multiple transmitters, the user data from each transmitter having being encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at the receiver, the receiver comprising:

a receiving stage configured to receive the signal;

an iterative processing stage configured to provide at least as many optimal independent linear combinations as the number of transmitters, the iterative processing stage comprising:

a processor configured to calculate coefficients of linear combinations of the codewords from the multiple transmitters,

a processor configured to calculate a scaling factor to be applied to the signal based on the coefficients,

a processor configured to apply the scaling factor to the signal to provide a linear combination of the codewords, and

a decoder configured to estimate an optimal linear combination of user data based on channel state information and the linear combination of the codewords; and the receiver also comprises a recovery stage configured to recover the user data from the optimal independent linear combinations.

Preferably the receiver is a base station for cellular wireless communications. Preferably the decoder is a Single-Input Single-Output (SISO) decoder. Examples of the present invention also relates to a method of transmitting. An example of the present invention relates to a method of transmitting user data as codewords of a Low Density Lattice, wherein each transmitter encodes its user data into a respective codeword for transmission and transmits the codeword on a carrier signal over air; wherein a plurality of the transmitters use a shared Low Density Lattice codebook for the encoding. Preferably, the transmitters are user terminals for wireless cellular

telecommunications.

Preferably the codewords are adapted by hypercube shaping for power control. Examples of the present invention also relates to a plurality of transmitters. An example of the present invention relates to a plurality of transmitters configured to transmit towards a receiver respective data as codewords of a Low Density Lattice, wherein each transmitter encodes its respective data into a respective codeword for transmission and transmits the codeword via a carrier signal over air; wherein the plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.

Brief Description of the Drawings

An embodiment of the present invention will now be described by way of example and with reference to the drawings, in which:

Figure 1 is a diagram illustrating the capacity of 4G systems as a function of

SINR for various modulation schemes, and the Shannon bound,

Figure 2 is a diagram illustrating a known Sparse Code Multiple Access (SCMA) encoder (PRIOR ART), and

Figure 3 is a diagram illustrating a Low Density Lattice Multiple Access (LDLMA) encoder according to a first embodiment for comparison with Figure 2,

Figure 4 is a diagram illustrating encoding and decoding procedure according to the first embodiment,

Figure 5 is a diagram illustrating in more detail the encoding shown in Figure 4 including generation of an LDLMA codeword from user data, and

Figure 6 is a flowchart illustrating in more detail the decoding shown in Figure

4.

Detailed Description

When considering the known media access method of the SCMA system mentioned above with reference to the Nikopour paper and Figure 2, the inventors realised that the complexity of the joint multiuser detection used in SCMA quickly grows with the number of users. This essentially inhibits a practical deployment of the proposed technology as operators require scalable solutions.

Low Density Lattice Multiple Access (LDLMA)

The inventors realised that it is possible to provide multi-user medium access, based on multi-dimensional low density lattice codes (LDLC). We refer to this as the low density lattice multiple access (LDLMA)

Low density lattice codes as such are known from the paper by N. Sommer, M. Feder, and O. Shalvi, "Low-density lattice codes," Information Theory, IEEE Transactions on, vol. 54, no. 4, pp. 1561-1585, April 2008.

As shown in Figures 3 and 4, each user terminal (user equipment, UE) 2 includes a respective LDLC encoder 4, and a single LDLC lattice codebook is used for encoding binary data 1 as codewords 9 of all network users.

As shown in Figure 4, accordingly, a receiver 6 receives a combination 8 of all transmitted codewords 9. Since all users use the same lattice, the received linear combination of multiple codewords 9 is also an element of the lattice codebook used. Thus, the receiver 6 only needs to decode linear combinations 10 of users' LDLC codewords rather than separating them as required by standard joint detection schemes. A single-input-single-output (SISO) LDLC decoder 12 performs this decoding by exploiting the posterior probability of linearly combined codewords in an iterative manner. This results a decoding complexity which is linear even when the number of users is large.

In this approach, the individual codewords of distinct network users are detected by estimating the best combination coefficients 14 subject to the knowledge of channel state information and the received combined codeword.

This approach does not require the receiver 6, for example a base station (BS) 7, to distinguish each user's codeword by using joint-multiuser detection. Instead the receiver 6 estimates the best linear combination of users' codewords then retrieves the individual user's data 16 by solving a set of linear equations for the estimated best coefficients. The base station does not need to separate each user's codeword so a Single-Input Single-Output (SISO) decoder 12 is sufficient. The encoding and decoding scheme may, of course, be implemented in either or both of uplink and downlink. Especially in the downlink (i.e. towards the user terminal), a SISO decoder may be used (having linear complexity), which reduces the hardware complexity of the mobile handset and saves user terminal battery energy.

The above is an outline. More detail is provided below.

Low Density Lattice Code

An n -dimensional lattice, denoted by Λ , is a set of points in " such that if x , y e Λ , then x + y e Λ , and if x e Λ , then -x e Λ . A lattice can always be written in terms of a lattice enerator matrix G e R" * "

A low-density lattice code (LDLC) is constructed by extending the well- known low-density parity check codes (LDPC); this is done by extending the parity check matrix and syndrome of LDPC from operating over finite field to a real or complex field. An « dimensional LDLC is an n -dimensional lattice code with a non- singular generator matrix G satisfying det |G| = 1 , for which the parity check matrix H = G 1 is sparse.

The row or column degree of H is defined as the number of nonzero elements in row or column, respectively. An n -dimensional LDLC is regular if all the row degrees and column degrees of the parity check matrix are equal to a common degree d . An n -dimensional regular LDLC with degree d is called "Latin square LDLC" if every row and column of the parity check matrix has the same nonzero values, except for a possible change of order and random signs. The sorted sequence of these d values is referred to as the generating sequence of the Latin square LDLC.

For example, a parity check matrix of a real LDLC with dimension n = 6 , row degree 4, column degree 3 and generating sequence {1, 0.8, 0.5} is as follows:

0.8 0 0.5 0 -1

0 0 1 -0.5 1 -0.8

H 0.5 1 0 -0.8 0 0.5

1 0 0 0.5

0 -0.5 1 0.8 Encoding

The encoding scheme is shown in more detail in Figure 5.

As shown in Figure 5, encoding in the encoder 4 involves power control 18 by Hypercube shaping, user data encoding 20, and transmission of that data , as described below.

Power Control

In practice, we adopt a power control (i.e.. shaping) algorithm so that LDLC codewords meet transmission power constraints. Accordingly, each user terminal 2 uses hypercube shaping, based on a lower triangular parity-check matrix H , to transfer the integer information vector \ e to another integer vector y' f such that x' g = G\' e satisfies the power constraint.

The hypercube shaping operation is given by where r t k is calculated as

Due to the linearity of LDLC, t ' = t modA from \ t ' = v e mod , where M is constellation size.

User Data Encoding

During user data transmission, binary user data are grouped to represent integers, and then mapped onto n -dimensional codewords of the LDLC lattice.

Transmission

Each codeword can be mapped onto distinct OFDM subcarriers or single antenna element of MIMO system.

Reception and Decoding

The reception and decoding stages are shown in Figure 6 and with reference to Figure 4. As shown in Figure 6, reception (step a) is followed by signal processing involving calculating (step b) the scaling factor and coefficients to apply and applying them (step c). The next stage is to one of obtaining (step d) the linear combination of users' messages then recovering (step e) the message of each individual user. These stages are considered below then an illustrative example is provided.

Reception of Superimposed codeword (step a)

Suppose the base station (BS) 7 serves L users such that the received signal the base station is given by y =∑ ¾ A + z » where x f is the transmitted lattice codeword with dimension n ; h, is the channel coefficient; and z D GV(o,a 2 I" ) is the noise. Signal Processing (step b, step c)

In order to form the linear combination of LDLC codewords, the base station 7 scales the received signal by a factor a and expands the scaled signal as ay =∑a e x e +∑(ah e - a e ) x e + az , where t is the linear combination of users' codewords and z eff is the effective noise.

Since the noise depends on the codeword, the optimal scaling factor a is obtained for this purpose by applying a minimum mean square error (MMSE) criterion such that the variance of the effective noise is minimized, as given by

HI ρ+σ

where p is the power of transmitted codeword; and the coefficient vector a = [« ) ,...,¾] is determined by maximizing the virtual rate of t , given by

Substituting a opt into the above equation results in:

p

(h, a) = ma X log H aMaii , , where M = be the Cholesky

decomposition of M , where L is some lower triangular matrix. (The existence of L follows from the fact that M is Hermitian and positive-definite.). This gives

aMa fl = ||aL|| 2 . Hence, the above rate optimization is equivalent to solving the followin shortest vector problem:

Obtaining Linear combinations of users' messages (step d)

After obtaining a opt , the base station 7 decodes the desired linear combination t . In order to successfully recover L user's messages, the base station has to decode the K optimal and independent linear combinations, where K≥L .

To decode the desired t , the proposed LDLMA scheme has to form the following distribution:

where t j is the j -th component of t ; l is the lattice codeword and / 7 is the j - th component of it; d(l,ay) denotes the Euclidean distance between ay and l ; and σ 2 ( , a) is the variance of effective noise , given by

σ 2 ( , a) = || h - a|| 2 Ρ + ασ 2 .

One expands t as follows where t itself is a valid codeword of LDLC such that r , which is the linear combination of users' messages, is extracted by passing t through the SISO LDLC decoder 12, given by f=LDLCDecoder ( y) , where r is the estimated signal. This is described in more detail as follows.

The decoder 12 iteratively estimates f T laY (t j | ay) by using Gallager's message passing algorithm over real or complex field. Messages sent by the variable nodes are probability density functions (PDFs) of the dimensional-wise component of t while the messages sent by the check nodes are the periodic extensions of PDFs of dimensional- wise component of t . Each variable node corresponds to a single element of the lattice codeword. Each check node corresponds to a check equation, in other words a row of matrix H.

Let t l ,...,t j ,...,t n and , ... , c ] ., ... , c n denote the variable nodes and check nodes respectively. The SISO decoder 12 for the LDLC lattice combination t essentially operates by applying the following method:

Initialization: the variable node t j sends the message to all neighbouring check nodes.

Basic iteration of check node message: each check node shares a different message with the neighbouring variable nodes. Suppose there are m (equals the row degree of H ) variable nodes connected to the check node c, . Those variable nodes are denoted by t j u ,v e {l,...,m} and we have an appropriate check equation e z >

where Z is the integer set and η τ is the entry of H . The message that was sent from t j o to the check node c, in the previous half-iteration is denoted as f u (ή ,υ e {l,..., m} . The calculation of the message that the check node c, sends back to the variable node t j follows the three basic steps: 1) Convolution step: all messages excluding f T (t) are convolved, where will be substituted into f u (/),u e I {τ} :

2) Stretching step: p T (t) is stretched by -η τ to ρ τ (t) = ρ τ (-η τ ή .

3) Periodic extension step: ρ τ (t) is extended to a periodic function with period given by

where Ρ τ (t) is the final message that is sent to the variable node t j T Basic iteration of variable node message: each variable node sends a message to the neighbouring check node.

Suppose there are e (equals to the column degree of H ) check nodes connected to the variable node t j , which are denoted by c j X , ε {l,...,e} . The message that the check node c sends back to the variable node t j in the previous half- iteration is denoted by Ρ λ (t) . The calculation of the message that is sent from the variable node t j to the check node c j T follows the two basic steps:

1) The product step:

2) the normalization step:

Repetition: The basic iteration is repeated until the iteration threshold is achieved. Final Decision: To extract the desired linear combination of users' message, the final PDF of the codeword elements t l ,...,t j ,...,t n should be estimated in the final iteration without excluding any check node message in the product step, given by Μ( = 6 2σ2Μ Π λ=1 ^( ·

Then, the estimated codeword element can be obtained from t = argmax /. fmal (, . At last, the desired r is calculated as f = |_H · tl .

Message Recovery (step e)

Given the channel state information, the base station 7 obtains the best κ linear combination f 's, indexed as [f j ,...,?^ ] , namely, at least as many optimal independent linear combinations are obtained as the number of transmitters. The coefficients of these linear combinations form a matrix In order to

successfully recover the users' messages [ν^. , ., ν^^ ] , the rank of A should be no less than L . As such, the base station takes the pseudo inverse to recover [ν^.,.,ν^^] , given by

Example

Here is a simple example to illustrate the decoding procedure of LDLMA: there are 2 user terminals with access to the base stations. Both user terminals employ the same LDLC codebook A , where the codewords are x 1 = Gv j and x 2 = Gv 2 , respectively. Assume that the channel coefficient vector is h = [/¾ h 2 ] T = [l 2.2] T such that the received signal is y = l j + 2.2x 2 + z . Assuming after the rate optimization, the base station selects, say, <¾ = 5 and a 2 = 4 as the best two scale factors such that have

5y = + l lx 2 + 5z , and

4y = + 8.8x 2 + 4z

= 4x j +9x 2 + (-0.2x 2 + 4z) .

5 1 1

where A = as t j ,t 2 G A , the SISO lattice decoder over Λ iteratively

4 9

estimates the distributions f (t x | y) and f Tj ]Y (t 2 | y) to extract = 5v j + l lv 2 and r 2 = 4v j + 9v 2 because of the following equalities: 5^ + 1 lx 2 = G^ + 1 lv 2 ) and

+ 9x 2 = G(4v ! + 9v 2 ) . Once we have r t , r 2 and A , we obtain the users' data V j v 2 by taking the inverse of A over and r 2 .

The present invention may be embodied in other specific forms without departing from its essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.

A person skilled in the art would readily recognize that steps of various above- described methods can be performed by programmed computers. Some embodiments relate to program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine-executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. Some embodiments involve computers programmed to perform said steps of the above-described methods.