Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
LATTICE REDUCTION-AIDED PERTURBED ADDITIVE DEMAPPER FOR MULTIPLE-INPUT MULTIPLE-OUTPUT SIGNAL DETECTION
Document Type and Number:
WIPO Patent Application WO/2023/201134
Kind Code:
A1
Abstract:
Certain aspects of the present disclosure provide techniques and apparatus for demapping a signal to a point in a signal constellation. An example method generally includes identifying (410) a seed point in a signal constellation from a received signal. A candidate set of codes for the signal is generated (420) based on a seed point and an additive perturbation applied to the seed point. A point in the signal constellation corresponding to the value of the received signal is identified (430) based on a probability distribution generated over the candidate set of codes. Generally, the identified point corresponds to a code in the candidate set of codes having a highest probability in the probability distribution. The point in the signal constellation is output (440) as the value of the received signal.

Inventors:
PESCHL MARKUS (US)
WORRALL DANIEL (US)
BEHBOODI ARASH (US)
BONDESAN ROBERTO (US)
SADEGHI POURIYA (US)
BARGHI SANAZ (US)
Application Number:
PCT/US2023/062782
Publication Date:
October 19, 2023
Filing Date:
February 17, 2023
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
QUALCOMM INC (US)
International Classes:
H04L25/06; H04B7/0413
Foreign References:
US20200186277A12020-06-11
Other References:
PONNAMPALAM V ET AL: "On Generating Soft Outputs for Lattice-Reduction-Aided MIMO Detection", PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2007), 24-28 JUNE 2007, GLASGOW, UK, IEEE, PISCATAWAY, NJ, USA, 1 June 2007 (2007-06-01), pages 4144 - 4149, XP031126316, ISBN: 978-1-4244-0353-0
WORRALL DANIEL E ET AL: "Learning Perturbations for Soft-Output Linear MIMO Demappers", GLOBECOM 2022 - 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE, IEEE, 4 December 2022 (2022-12-04), pages 5213 - 5218, XP034268426, DOI: 10.1109/GLOBECOM48099.2022.10001724
Attorney, Agent or Firm:
ROBERTS, Steven E. et al. (US)
Download PDF:
Claims:
WHAT IS CLAIMED IS: 1. A method of wireless communication performed by a wireless device in a wireless communication network, comprising: identifying a seed point in a signal constellation from a received signal; generating a candidate set of codes for the received signal based on a seed point and an additive perturbation applied to the seed point; identifying a point in the signal constellation corresponding to a value of the received signal based on a probability distribution generated over the candidate set of codes, wherein the identified point corresponds to a code in the candidate set of codes having a highest probability in the probability distribution; and outputting the identified point in the signal constellation as the value of the received signal. 2. The method of Claim 1, wherein identifying the seed point comprises demapping the received signal based on a linear transformation. 3. The method of Claim 2, wherein demapping the received signal comprises: reparameterizing a matrix representing a channel over which the received signal is received based on lattice reduction using a unimodular matrix; and demapping the received signal based on the reparameterized matrix and a symbol vector representing the received signal. 4. The method of Claim 1, wherein generating the candidate set of codes comprises selecting points in the signal constellation comprising points within a quadrilateral defined with the seed point as a center point of the quadrilateral. 5. The method of Claim 1, wherein generating the candidate set of codes comprises selecting points in the signal constellation as a uniform distribution within a circle defined based on a radius from the seed point. 6. The method of Claim 1, wherein generating the candidate set of codes comprises selecting points in the signal constellation as a uniform distribution within an ellipse defined with the seed point as a center point of the ellipse.

7. The method of Claim 1, wherein generating the candidate set of codes comprises selecting points in the signal constellation based on a Gaussian distribution calculated from a density function. 8. The method of Claim 7, wherein parameters of the Gaussian distribution comprise parameters identified based on a Bayesian optimization. 9. The method of Claim 1, wherein identifying the point in the signal constellation corresponding to the value of the received signal comprises computing a log likelihood ratio over the candidate set of codes. 10. The method of Claim 9, wherein the log likelihood ratio is calculated based on clipping to a maximum value associated with a signal-to-noise ratio of the received signal. 11. The method of Claim 10, further comprising retrieving the maximum value from a lookup table keyed by signal-to-noise ratio values. 12. The method of Claim 10, further comprising identifying the maximum value based on a Bayesian optimization. 13. The method of Claim 1, further comprising performing communications in the wireless communications network based on the identified point in the signal constellation. 14. The method of Claim 1, wherein the wireless communications network is a 5G network. 15. The method of Claim 1, wherein outputting the identified point comprises outputting the identified point for processing with one or more other points from one or more other signals in a forward error correction component of a wireless transceiver. 16. A processing system, comprising: a memory having computer-executable instructions stored thereon; and a processor configured to execute the computer-executable instructions in order to cause the processing system to: identify a seed point in a signal constellation from a received signal; generate a candidate set of codes for the received signal based on a seed point and an additive perturbation applied to the seed point; identify a point in the signal constellation corresponding to a value of the received signal based on a probability distribution generated over the candidate set of codes, wherein the identified point corresponds to a code in the candidate set of codes having a highest probability in the probability distribution; and output the identified point in the signal constellation as the value of the received signal. 17. The processing system of Claim 16, wherein in order to identify the seed point, the processor is configured to cause the processing system to demap the received signal based on a linear transformation. 18. The processing system of Claim 17, wherein in order to demap the received signal, the processor is configured to cause the processing system to: reparameterize a matrix representing a channel over which the received signal is received based on lattice reduction using a unimodular matrix; and demap the received signal based on the reparameterized matrix and a symbol vector representing the received signal. 19. The processing system of Claim 16, wherein in order to generate the candidate set of codes, the processor is configured to cause the processing system to select points in the signal constellation comprising points within a quadrilateral defined with the seed point as a center point of the quadrilateral. 20. The processing system of Claim 16, wherein in order to generate the candidate set of codes, the processor is configured to cause the processing system to select points in the signal constellation as a uniform distribution within a circle defined based on a radius from the seed point. 21. The processing system of Claim 16, wherein in order to generate the candidate set of codes, the processor is configured to cause the processing system to select points in the signal constellation as a uniform distribution within an ellipse defined with the seed point as a center point of the ellipse. 22. The processing system of Claim 16, wherein in order to generate the candidate set of codes, the processor is configured to cause the processing system to select points in the signal constellation based on a Gaussian distribution calculated from a density function. 23. The processing system of Claim 22, wherein parameters of the Gaussian distribution comprise parameters identified based on a Bayesian optimization. 24. The processing system of Claim 16, wherein in order to identify the point in the signal constellation corresponding to the value of the received signal, the processor is configured to cause the processing system to compute a log likelihood ratio over the candidate set of codes. 25. The processing system of Claim 24 wherein the log likelihood ratio is calculated based on clipping to a maximum value associated with a signal-to-noise ratio of the received signal. 26. The processing system of Claim 25, wherein the processor is further configured to cause the processing system to retrieve the maximum value from a lookup table keyed by signal-to-noise ratio values. 27. The processing system of Claim 16, wherein the processor is further configured to cause the processing system to perform communications in a wireless communications network based on the identified point in the signal constellation. 28. The processing system of Claim 16, wherein in order to output the identified point, the processor is configured to cause the processing system to output the identified point for processing with one or more other points from one or more other signals in a forward error correction component of a wireless transceiver. 29. A processing system for wireless communications, comprising: means for identifying a seed point in a signal constellation from a received signal; means for generating a candidate set of codes for the received signal based on a seed point and an additive perturbation applied to the seed point; means for identifying a point in the signal constellation corresponding to a value of the received signal based on a probability distribution generated over the candidate set of codes, wherein the identified point corresponds to a code in the candidate set of codes having a highest probability in the probability distribution; and means for outputting the identified point in the signal constellation as the value of the received signal. 30. A non-transitory computer-readable medium comprising computer- executable instructions that, when executed by one or more processors of a processing system, cause the processing system to perform an operation comprising: identifying a seed point in a signal constellation from a received signal; generating a candidate set of codes for the received signal based on a seed point and an additive perturbation applied to the seed point; identifying a point in the signal constellation corresponding to a value of the received signal based on a probability distribution generated over the candidate set of codes, wherein the identified point corresponds to a code in the candidate set of codes having a highest probability in the probability distribution; and outputting the identified point in the signal constellation as the value of the received signal.

Description:
LATTICE REDUCTION-AIDED PERTURBED ADDITIVE DEMAPPER FOR MULTIPLE-INPUT MULTIPLE-OUTPUT SIGNAL DETECTION CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application claims priority to and benefit of U.S. Patent Application No. 18/155,454, filed January 17, 2023, entitled “Lattice Reduction-Aided Perturbed Additive Demapper for Multiple-Input Multiple-Output Signal Detection”, which claims benefit of and priority to U.S. Provisional Patent Application Serial No. 63/363,031, entitled “Lattice Reduction-Aided Perturbed Additive Demapper for Multiple-Input Multiple- Output Signal Detection,” filed April 15, 2022, and assigned to the assignee hereof, the contents of each of which are hereby incorporated by reference in their entireties. INTRODUCTION [0002] Aspects of the present disclosure relate to signal detection in wireless communication systems. [0003] Multiple-input, multiple output (MIMO) systems generally involve communications using multiple antennas at the transmitter and the receiver. Generally, by communicating using multiple transmit and receive antennas, MIMO techniques generally allow for multiple data streams to be transmitted and received simultaneously. By doing so, the capacity and throughput provided by a wireless communication system can be increased relative to single-input, single-output systems. MIMO communications may be performed using various techniques, such as spatial multiplexing, in which different signals are transmitted using different transmit antennas, beamforming (or spatial filtering), in which signals are transmitted directionally with a highest radiated power in a particular direction from a transmitting device, or the like. [0004] Generally, MIMO signals are recovered by demapping a received signal to a point in a signal constellation, such as a quadrature amplitude modulation (QAM) constellation. A signal constellation generally includes a plurality of points in a multidimensional space, with each point representing a discrete value (e.g., of a bitstream). A received signal may be demapped to one of these points in the multidimensional space, and the bit value of the point into which the received signal is demapped is generally output for further processing. [0005] Demapping a MIMO signal into a point in a signal constellation generally involves a probabilistic estimate of transmitted bits, which may be corrected through the use of various error correction codes, such as a low-density parity check (LDPC) code. Because of the computational expense of calculating probability estimates for transmitted bits, lower-complexity detectors are used to demap a received MIMO signal. However, these detectors may still be computationally complex, result in high power consumption, and be implemented using significant amounts of area in a processing circuit. BRIEF SUMMARY [0006] Certain aspects provide a processor-implemented method for demapping a signal to a point in a signal constellation. An example method generally includes identifying a seed point in a signal constellation from a received signal. A candidate set of codes for the signal is generated based on a seed point and an additive perturbation applied to the seed point. A point in the signal constellation corresponding to the value of the received signal is identified based on a probability distribution generated over the candidate set of codes. Generally, the identified point corresponds to a code in the candidate set of codes having a highest probability in the probability distribution. The point in the signal constellation is output as the value of the received signal. [0007] Other aspects provide processing systems configured to perform the aforementioned methods as well as those described herein; non-transitory, computer- readable media comprising instructions that, when executed by one or more processors of a processing system, cause the processing system to perform the aforementioned methods as well as those described herein; a computer program product embodied on a computer-readable storage medium comprising code for performing the aforementioned methods as well as those further described herein; and a processing system comprising means for performing the aforementioned methods as well as those further described herein. [0008] The following description and the related drawings set forth in detail certain illustrative features of one or more aspects. BRIEF DESCRIPTION OF THE DRAWINGS [0009] The appended figures depict certain aspects of the present disclosure and are therefore not to be considered limiting of the scope of this disclosure. [0010] FIG.1 depicts mappings of decoded signals to points in a signal constellation. [0011] FIG. 2 depicts examples of areas in a signal constellation from which candidate codes for a received signal may be selected, according to aspects of the present disclosure. [0012] FIG.3 depicts an example set of candidate codes in a signal constellation for a received signal, according to aspects of the present disclosure. [0013] FIG. 4 depicts example operations for demapping a received signal into a point in a signal constellation based on a lattice reduction-aided perturbed additive demapper, according to aspects of the present disclosure. [0014] FIG.5 depicts an example implementation of a processing system on which a received signal is demapped into a point in a signal constellation, according to aspects of the present disclosure. [0015] To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the drawings. It is contemplated that elements and features of one aspect may be beneficially incorporated in other aspects without further recitation. DETAILED DESCRIPTION [0016] Aspects of the present disclosure provide techniques and apparatus for demapping received signaling to a corresponding point in a signal constellation in a wireless communication system. [0017] Multiple-input multiple-output (MIMO) techniques are generally used to achieve high data rates by transmitting signals from multiple antennas for reception by multiple antennas. At a receiver, various demappers may be used to decode the received signal and provide the received signal to error correction blocks for further processing. Because calculating probability estimates over transmitted bits to use as an input into error correction blocks is generally a computationally complex task, fixed lower- complexity detectors are used to attempt to simplify the task of demapping signals into a point in a signal constellation corresponding to a particular set of bit values. [0018] In one example, linear MIMO detectors use zero-forcing (ZF) or minimum- mean squared error (MMSE) techniques to demap a received signal into a point in a signal constellation. These linear MIMO detectors, however, do not account for inter-stream interference in which one stream causes interference to other streams, and thus, are generally not able to demap received signals in situations in which the signals carried on different carriers are highly correlated. To address the inability of ZF- or MMSE-based linear MIMO detectors to account for inter-stream interference, tree-based MIMO detectors are used to iteratively search for candidate values corresponding to a received signal. These tree-based methods, however, rely on manually designed heuristics that result in a limited amount of flexibility in optimizing the MIMO detector for various channel statistics (e.g., channel signal strength properties, etc.) and various error correction procedures. Further, as the size of these signal constellations increases, and as the number of antennas via which signaling is transmitted and received increases, the trees used by tree-based MIMO detectors may become increasingly (and unfeasibly) large, which may further complicate implementation of these MIMO detectors in hardware. [0019] Aspects of the present disclosure provide techniques that demap signals using a perturbed additive (e.g., linear) demapper that uses machine learning techniques to learn a parametric distribution of signal values centered on a seed point in a signal constellation. By using machine learning techniques to demap signals to a point in a signal constellation, aspects of the present disclosure may reduce the computational complexity of demapping signals to the corresponding points in signal constellations. Further, these machine learning techniques may allow for increased flexibility in implementing MIMO detectors, as these machine learning techniques may be used for varying sizes of signal constellations (e.g., 64QAM, 128QAM, 256QAM, etc.) and varying numbers of antennas involved in a MIMO system. Additionally, these machine learning techniques may improve the accuracy of demapping received signals to points in the signal constellation by generating more reliable log-likelihood ratios (LLRs) for subsequent error correction. Because these machine learning techniques can improve the accuracy of demapping received signals to points in the signal constellation, more reliable transmission can be achieved, with corresponding decreases in the number of retransmissions needed to successfully transmit data in a wireless communications system, reductions in power utilization from handling transmission and retransmissions, and the like. Example Demapping of Signals to a Point in a Signal Constellation [0020] Generally, a MIMO system may be a multiple antenna system with ^^ transmit antennas and ^^ ^ ^^ receive antennas. A coded bit stream may be mapped to transmit symbol vectors complex constellation for α> 0 and even Q, and x j represents the number of bits per symbol. α may be chosen such that QAM symbols are normalized to unit power per dimension (e.g., such that Each symbol vector generally has a corresponding decoded bit value in where x j,b is the ^^th bit in the jth dimension/layer of x. [0021] In demapping a MIMO signal to a point in a signal constellation, it is generally assumed that signaling is transmitted in a flat-fading environment with a block fading channel (e.g., having constant gains per frame) that changes independently frame-to- frame. Thus, for any slot in a time-discrete complex baseband model with a noise vector (e.g., additive white Gaussian noise (AWGN)), the resulting vector y in the signal constellation may be represented by the equation y=Hx+n. H represents an N × M matrix representing a Rayleigh fading channel with independent and identically distributed complex Gaussian fading gain entries represents a zero-mean circular-symmetric complex Gaussian noise vector with identity covariance . In this model, the per-stream signal-to-noise ratio (SNR) may be represented by the equation 10 log(1/ σ 2 ), and perfect channel estimation may be assumed at the receiver. [0022] To detect the value of a signal in a MIMO system using soft output detection, bitwise LLRs may be calculated according to the equation: which may be used as an input into a downstream error correction algorithm. Given the AWGN-based model discussed above, LLRs can be rewritten according to the equations and where is the subset of points x with bit represents the subset of points x with bit The corresponding bit of the larger of the two log likelihoods (in absolute value) is referred to as the hypothesis bit and the smaller, the counterhypothesis bit. A large part of the complexity of soft-output demappers is in computing counterhypothesis bits, because while a single hypothesis vector x contains all the hypothesis bits, the counterhypothesis bits may be scattered across up to MQ counterhypothesis vectors. [0023] To simplify this, an approximation of may be calculated according to the expression: which may be an approximation of a hard-output problem defined according to the equation However, even though the approximation of may simplify the process of detecting the value of a signal in a MIMO system, calculating may remain an NP-complete problem for which verifying the correctness of a solution may be performed in polynomial time and a brute-force search may be used to find a solution from the universe of possible solutions. [0024] To demap a received vector, a linear detector may demap the received vector y by left-multiplying y=Hx+n by a linear filter matrix G and then quantizing the result to a point in the signal constellation. The quantization may be defined for a finite set X according to the equation for a scalar variable x. For complex scalar variables, the real and imaginary components may be quantized independently; for vectors, each dimension of the vector may be quantized independently. [0025] Mathematically, a linear detector may be represented by the equation: where denotes quantization and remapping of Gy into the constellation Ω M . Generally different types of linear detectors may define G differently. For example, a ZF detector can use the Moore-Penrose pseudo-inverse of a channel matrix according to the equation while an MMSE detector may use noise statistics of a channel and define G according to the equation In some aspects, an MMSE detector may be represented as a ZF detector over an extended channel, where satisfies the identity function: where represent vectors at a higher dimensionality than [0026] The above equations generally produce hard outputs, or an output of a specific vector. To compute a soft output (e.g., including some measure of a likelihood that the output is the correct output), the channel model may be rewritten according to the equation: where h 1 , h 2 , … represent the columns of H and n j represents a new noise vector treating layers as interference. By marginalizing the symbols a new channel for may have covariance Thus, the problem of demapping a signal to a point in a signal constellation may be reduced into a one-dimensional problem by left- multiplying the equation by a per-channel decorrelating filter w j , resulting in the equation: In some aspects, may be approximated with a one-dimensional complex Gaussian with matched variance, resulting in the expression: where is the variance K projected on to is the subset of constellation points with bit b set to ±1. The expressions presented above may implement a soft-output ZF detector. To implement a soft-output MMSE detector, may be used in place of ( H,y). [0027] The columns of H may form the basis of a lattice according to the equation: The lattice bases may be non-unique, and transformation between different bases may be performed by right-multiplication of H with a unimodular matrix U, defined according to the expression: where the general linear group over the complex integers, is the set of all matrices with complex integer entries and unit determinant. Each element of thus each unimodular matrix, has an inverse, which is also unimodular. Due to the unit determinant, right-multiplication by U is volume-preserving. [0028] The unimodular matrices may allow for a change of basis for the lattice ℒ and thus may allow for a reparameterization of the channel In many cases, MIMO detectors may not be invariant using reparameterization, and thus, some choices of U may provide higher performance than others. If the columns in H are orthogonal, it may be observed that the channel does not have inter-stream interference, and thus, linear detectors may be an optimal choice for demapping a signal to a point in a signal constellation. Thus, an optimal U may be a unimodular matrix that approximately orthogonalizes the columns of H, measured in terms of the log orthogonality defect represented by the equation: The log orthogonality defect may be a non-negative quantity that decreases as the orthogonality between columns of H increases, reaching zero when the columns of H are fully orthogonal. Lattice reduction implemented by these equations may thus be used in linear detectors, as discussed above, using a channel and quantizing to a reduced lattice before transforming back and bounding to the original constellation Further, it should be noted that the lattice quantization operator of a lattice may be efficiently computed using the equation [0029] FIG. 1 illustrates examples of signal constellations in which received signaling in a MIMO wireless communications system are demapped to points in a signal constellation. [0030] In a constellation 110, the points in the constellation are arranged in a grid defined by perpendicular lines. In constellations 120 and 130, the points in the constellation are arranged in a grid having lines drawn at an angle from lines parallel to an axis (the vertical axis in the constellation 120 and the horizontal axis in the constellation 130). A central point within a grid box represents a particular bit value of a signal. Points within the grid box may be mapped to the central point within that grid box. [0031] In the constellation 110, a received signal is mapped to a seed point 112. Because the seed point 112 is within a grid box having a point 114 as its center, a MIMO demapper can map the seed point 112 to the point 114 and output the bit stream associated with the point 114 as the bits carried in the received signal. Similarly, in the constellation 120, a received signal is mapped to a seed point 122 within a grid box having a point 124 as its center, and a MIMO detector may thus output the bit value associated with the point 124 as the bits carried in the received signal. In the constellation 130, a received signal is mapped to a seed point 132 within a grid box having a point 134 as its center, and a MIMO detector may thus output the bit value associated with the point 134 as the bits carried in the received signal. [0032] To improve the efficiency of MIMO demapping, aspects of the present disclosure provide techniques for applying perturbations to a seed point and machine learning techniques to generate a candidate set of codes (or points in the signal constellation) associated with a received signal to determine the value of the received signal. In doing so, the search space over which a received signal is demapped may be reduced from the whole of a signal constellation to a portion of the signal constellation. Within this portion of the signal constellation, there is generally a high likelihood that a point in the signal constellation corresponds to the received signal. By reducing the search space from the whole of the signal constellation to a portion of the signal constellation, the computational expense of demapping received signals to a point in the signal constellation may be reduced, which may reduce the amount of power used in processing signaling and communicating in a wireless communications network and may reduce the amount of circuitry used to implement a signal demapper. [0033] Generally, the complexity involved in calculating is determined by the size of the search space scaling exponentially in M and Q. That is, as the number of transmit antennas M increases, and as the number of bits Q represented by points in a signal constellation increases, the size of the search space exponentially increases. These exponential increases may become impractical as devices implement additional transmit antennas and as the size of the signal constellations increase to accommodate higher bit rates or other changes in wireless communications systems. To reduce the complexity involved in calculating LLRs over points in a signal constellation, aspects of the present disclosure replace each set of points with a smaller candidate set over which LLRs are to be calculated. [0034] A candidate set ℬ may be generated using a perturbed linear model in which the output of a linear receiver is augmented with a number of small perturbations δ. The perturbed outputs are quantized back to the signal constellation, such that the candidate set is represented by the equation: [0035] In generating the candidate set, a seed point may be initially selected according to the equation The seed point may be referred to as the Babai point, or estimate, of the value of a bitstream of a signal vector x carried in a received signal y. The points included in a candidate set ℬ may be selected from the set instead of where Δ corresponds to an area over which a perturbation of the seed point is selected such that the seed point is always included in the candidate set ℬ. The set ℬ may then be sifted into candidate sets for each bit Generally, . [0036] Selecting the points included in the candidate set ℬ based on the seed point may be motivated by the hypothesis that the symbol with the highest likelihood of corresponding to the signal vector x carried in the received signal lies close to the linear receiver output and may be found within an area centered on spanned by The counterhypothesis of the value of the received signal, and the point to which the received signal can be mapped, may be found within a region around . [0037] FIG.2 illustrates areas in a signal constellation from which candidate codes for a received signal may be selected using perturbations applied to a seed point, according to aspects of the present disclosure. As illustrated, the various perturbations may be defined, for example, as (but not limited to) a quadrilateral 210 (e.g., square, rectangle, etc.) centered on a seed point 205, a ball (or circle 220) centered on the seed point 205, an ellipse 230 centered on the seed point 205, a Gaussian distribution 240 centered on the seed point 205, and/or the like. [0038] To generate the candidate set ℬ using perturbations defined within the quadrilateral 210, each perturbation δ may be defined according to the equation: [0039] To generate the candidate set ℬ using perturbations defined within the circle 220, the perturbations may be defined according to the equation: [0040] To generate the candidate set ℬ using perturbations defined within the ellipse 230, the perturbations may be defined according to the equation: [0041] Finally, to generate the candidate set ℬ using perturbations defined within the Gaussian distribution 240, the perturbations may be defined according to the equation: [0042] In each of the equations discussed above, α is the minimum separation between QAM-constellation points; is the radius of a zero-centered complex ball; u is a real uniform random variable in interval is the number of transmit antennas; is a radial weighting factor; is a random vector drawn from a uniform distribution on the complex sphere of dimension is a complex Gaussian vector from a zero-centered unit-variance circular symmetric complex density; is a one-hot vector with a one in position and is a 1D constellation. [0043] In an example in which samples are drawn within the circle 220, the circle 220 may be defined as a ball with radius the distribution is uniform, with increasing the density of samples close to 0. [0044] In an example in which samples are drawn within the ellipse 230, samples may be drawn from a distribution within the ellipse 230 and passed through G, which makes the distribution of samples ellipsoidal. The dimensions of the samples may be correlated with G, as for ZF detectors (or other linear detectors) with H + , the decoded symbol vectors may take the form which is centered on with additive noise [0045] In an example in which samples are drawn from within the Gaussian distribution 240, a set of Gaussian samples may be defined (e.g., over a density function, with parameters of the Gaussian distribution identified based on a Bayesian optimization, as discussed in further detail below) and passed through G. [0046] In each of the examples illustrated in FIG. 2, it should be recognized that, according to various aspects, the generation of perturbations may be parallelized, as the value of a symbol carried in a signal generally is independent of the value of a different symbol carried in the same signal. Thus, for each symbol for which a value is to be recovered, the symbols may be processed independently and in parallel to accelerate the process of recovering the values carried in a received signal. [0047] After the candidate set ℬ is generated, LLRs may be computed using max-log approximation according to the equation: In some aspects, one of the sets is empty, and the corresponding defaults to ∞. Because ∞ may not be a usable value, and because LLRs exceeding a set value may not provide optimal information for error correction and decoding, LLRs may be clipped to a maximum LLR value, L max , such that may be optimized for different signal conditions (e.g., signal-to-noise ratios) and may be stored in a lookup table, with an SNR or range of SNRs serving as a key for any given value of L max . [0048] FIG.3 depicts an example set of candidate codes 300 in a signal constellation for a received signal, according to aspects of the present disclosure. As illustrated, the set of candidate codes ℬ may be generated from a Gaussian distribution 320 centered on a seed point 310. [0049] In some aspects, to generate the candidate set ℬ , perturbations may be randomly selected within the Gaussian distribution 320. In some aspects, however, perturbations may be defined according to parameters Lmax and perturbation distribution parameters These parameters may be optimized, for example, using a Bayesian optimization model. Generally, in a Bayesian optimization machine learning model, the parameters may be globally optimized. For each SNR (or range of SNRs), a bit error rate (BER) may be averaged over a subset of B instances of a channel defined by the equation for a given value of an input θ . A Gaussian process may be fit with a Matérn covariance kernel to a training data set of input-output pairs The result of this Gaussian process may be a differentiable Bayesian regression estimator of the mapping, which can be used to choose the next value of θ in the optimization process. [0050] In some aspects, the Bayesian optimization may be executed as an “offline” process to find optimal values (constrained by noise and other optimization constraints) of θ for each SNR. During use, θ may be looked up from a lookup table given the SNR of the channel over which a received signal is carried. θ may generally be chosen to optimize end-to-end performance and may allow for the performance of MIMO demappers to be more efficient than performing a grid search over the signal constellation, which may become computationally infeasible. [0051] In some aspects, it should be noted that generating the candidate set of points ℬ for a given received signal using perturbation need not involve the use of lattice reduction. Lattice reduction generally allows for the identification of a hypothesis of sufficient quality (e.g., the identification of a seed point that may be assumed to be close to the actual point in the signal constellation corresponding to the received signal) around which perturbations can be defined. When lattice reduction is used, the channel H may be replaced with HU -1 , and the quantization operation may be similarly defined. Because lattice reduction is generally a computationally complex problem, an approximation algorithm, such as an algorithm involving a number of Gram-Schmidt iterations (e.g., defined as where M, as described above, corresponds to a number of transmit antennas) may be used to compute U. Generally, U may be computed once for each H, and the expense of computing U and performing lattice reduction may be amortized over multiple channels where H is assumed to be constant. [0052] In some aspects, where lattice reduction is used in processing a received signal, lattice reduction can be performed for each subcarrier. However, lattice reduction can be shared across multiple subcarriers. For example, lattice reduction performed for one subcarrier may be applied to other subcarriers within a coherence bandwidth defined for the wireless communications system in which signaling is received. This coherence bandwidth may include, for example, frequencies over which a channel is constant (e.g., in which signals may have comparable or correlated fading characteristics). Example Operations for Demapping Signals to a Point in a Signal Constellation [0053] FIG.4 illustrates example operations 400 demapping a received signal into a point in a signal constellation based on a lattice reduction-aided perturbed additive demapper, according to aspects of the present disclosure. The operations 400 may be performed, for example, by a receiving wireless device in a wireless communication system, such as (but not limited to) a user equipment (UE) in (but not limited to) a 5G cellular telecommunications system, a wireless station in a Wi-Fi (802.11) network, or the like. [0054] As illustrated, the operations 400 include, at block 410, identifying a seed point in a signal constellation from a received signal. In some aspects, the seed point may be identified by demapping the received signal based on a linear transformation. This linear transformation may include a matrix reparameterization and a demapping based on the reparametrized matrix. The matrix may be reparametrized based on lattice reduction using a unimodular matrix, and the received signal may be demapped based on the reparametrized matrix and a symbol vector representing the received signal. The unimodular matrix (e.g., a square matrix where each entry has a value of -1, 0, or 1) may be a matrix in a set of matrices with complex integer entries and a unit determinant in a general linear group over a set of complex integer entries. In reparameterizing the matrix representing the channel, the matrix may be transformed from H to HU -1 . [0055] At block 420, the operations 400 proceed with generating a candidate set of codes for the signal based on a seed point and an additive perturbation applied to the seed point. [0056] In some aspects, the candidate set of codes may be generated by selecting points in a signal constellation comprising points within a quadrilateral defined with the seed point as a center point of the quadrilateral. In some aspects, the candidate set of codes may be generated by selecting points in a signal constellation as a uniform distribution within a circle defined based on a radius from the seed point. In some aspects, the candidate set of codes may be generated by selecting points in the signal constellation as a uniform distribution within an ellipse defined with the seed point as a center point of the ellipse. [0057] In some aspects, generating the candidate set of codes may include selecting points in the signal constellation based on a Gaussian distribution calculated from a density function. The Gaussian distribution may also use the seed point as a center point of the Gaussian distribution, and the selected points in the signal constellation may be identified relative to the seed point based on parameters identified based on a Bayesian optimization. These parameters may include, for example, perturbation distribution parameters ^^ and ^^, where r corresponds to a radius from the seed point from which codes in the candidate set are to be selected and ^^ corresponds to a sample density. These parameters may be learned based on mappings between inputs ^^ and averaged bit error rates over a number of inputs for a given signal-to-noise ratio. [0058] At block 430, the operations 400 proceed with identifying a point in the signal constellation corresponding to a value of the received signal based on a probability distribution generated over the candidate set of codes. The identified point generally corresponds to a code in the candidate set of codes having a highest probability in the probability distribution. [0059] In some aspects, to identify the point in the signal constellation corresponding to the value of the received signal, a log likelihood ratio may be computed over the candidate set of codes. The log likelihood ratio may be calculated based on clipping to a maximum LLR value associated with a signal-to-noise ratio of the received signal, which may be retrieved from a lookup table keyed by signal-to-noise ratio values or may be identified based on a Bayesian optimization. [0060] At block 440, the operations 400 proceed with outputting the point in the signal constellation as the value of the received signal. The point may be output with one or more points from one or more other signals in a forward error correction component of a wireless transceiver. The forward error correction component may use, for example, low density parity check (LDPC) algorithms or other error correcting algorithms to correct for bit errors in a bitstream generated from the signal and the one or more other signals. [0061] In some aspects, the operations 400 may include performing communications in a wireless communications network based on the point in the signal constellation. The wireless communications network may include a cellular wireless communications network (e.g., a 5G network), an IEEE 802.11 wireless communications network, or other wireless communications network in which data may be transmitted and received over a wireless channel. The communications may include voice and/or data communications carried in the wireless communications network. Example Processing Systems for Demapping Signals to a Point in a Signal Constellation [0062] FIG. 5 depicts an example processing system 500 for demapping received signals to a point in a signal constellation, such as described herein for example with respect to FIG.4. [0063] The processing system 500 includes a central processing unit (CPU) 502, which in some examples may be a multi-core CPU. Instructions executed at the CPU 502 may be loaded, for example, from a program memory associated with the CPU 502 or may be loaded from a memory 524. [0064] The processing system 500 also includes additional processing components tailored to specific functions, such as a graphics processing unit (GPU) 504, a digital signal processor (DSP) 506, a neural processing unit (NPU) 508, a multimedia processing unit 510, a wireless connectivity component 512. [0065] An NPU, such as the NPU 508, is generally a specialized circuit configured for implementing the control and arithmetic logic for executing machine learning algorithms, such as algorithms for processing artificial neural networks (ANNs), deep neural networks (DNNs), random forests (RFs), and the like. An NPU may sometimes alternatively be referred to as a neural signal processor (NSP), tensor processing unit (TPU), neural network processor (NNP), intelligence processing unit (IPU), vision processing unit (VPU), or graph processing unit. [0066] NPUs, such as the NPU 508, are configured to accelerate the performance of common machine learning tasks, such as image classification, machine translation, object detection, and various other predictive models. In some examples, a plurality of NPUs may be instantiated on a single chip, such as a system on a chip (SoC), while in other examples they may be part of a dedicated neural-network accelerator. [0067] NPUs may be optimized for training or inference, or in some cases configured to balance performance between both. For NPUs that are capable of performing both training and inference, the two tasks may still generally be performed independently. [0068] NPUs designed to accelerate training are generally configured to accelerate the optimization of new models, which is a highly compute-intensive operation that involves inputting an existing dataset (often labeled or tagged), iterating over the dataset, and then adjusting model parameters, such as weights and biases, in order to improve model performance. Generally, optimizing based on a wrong prediction involves propagating back through the layers of the model and determining gradients to reduce the prediction error. [0069] NPUs designed to accelerate inference are generally configured to operate on complete models. Such NPUs may thus be configured to input a new piece of data and rapidly process it through an already trained model to generate a model output (e.g., an inference). [0070] In one implementation, the NPU 508 is a part of one or more of the CPU 502, GPU 504, and/or DSP 506. [0071] In some examples, the wireless connectivity component 512 may include subcomponents, for example, for third generation (3G) connectivity, fourth generation (4G) connectivity (e.g., 4G LTE), fifth generation connectivity (e.g., 5G or NR), Wi-Fi connectivity, Bluetooth connectivity, and other wireless data transmission standards. The wireless connectivity component 512 is further coupled to one or more antennas 514. [0072] The processing system 500 may also include one or more sensor processing units 516 associated with any manner of sensor, one or more image signal processors (ISPs) 518 associated with any manner of image sensor, and/or a navigation component 520, which may include satellite-based positioning system components (e.g., GPS or GLONASS) as well as inertial positioning system components. [0073] The processing system 500 may also include one or more input and/or output devices 522, such as screens, touch-sensitive surfaces (including touch-sensitive displays), physical buttons, speakers, microphones, and the like. [0074] In some examples, one or more of the processors of the processing system 500 may be based on an ARM or RISC-V instruction set. [0075] The processing system 500 also includes memory 524, which is representative of one or more static and/or dynamic memories, such as a dynamic random access memory (DRAM), a flash-based static memory, and the like. In this example, the memory 524 includes computer-executable components, which may be executed by one or more of the aforementioned processors of the processing system 500. [0076] In particular, in this example, the memory 524 includes a seed point identifying component 524A, a candidate set generating component 524B, a point identifying component 524C, a point outputting component 524D, and a machine learning model 524E. The depicted components, and others not depicted, may be configured to perform various aspects of the methods described herein. [0077] Generally, the processing system 500 and/or components thereof may be configured to perform the methods described herein. [0078] Notably, in other aspects of the present disclosure, elements of the processing system 500 may be omitted, such as where the processing system 500 is a server computer or the like. For example, the multimedia processing unit 510, wireless connectivity component 512, sensor processing units 516, ISPs 518, and/or navigation component 520 may be omitted in other aspects. Further, elements of the processing system 500 may be distributed, such as training a model and using the model to generate inferences. Example Clauses [0079] Implementation details of various aspects are described in the following numbered clauses. [0080] Clause 1: A method performed by a wireless device in a wireless communication network, comprising: identifying a seed point in a signal constellation from a received signal; generating a candidate set of codes for the received signal based on a seed point and an additive perturbation applied to the seed point; identifying a point in the signal constellation corresponding to a value of the received signal based on a probability distribution generated over the candidate set of codes, wherein the identified point corresponds to a code in the candidate set of codes having a highest probability in the probability distribution; and outputting the point in the signal constellation as the value of the received signal. [0081] Clause 2: The method of Clause 1, wherein identifying the seed point comprises demapping the received signal based on a linear transformation. [0082] Clause 3: The method of Clause 2, wherein demapping the received signal comprises: reparameterizing a matrix representing a channel over which the received signal is received based on lattice reduction using a unimodular matrix; and demapping the received signal based on the reparameterized matrix and a symbol vector representing the received signal. [0083] Clause 4: The method of any of Clauses 1 through 3, wherein generating the candidate set of codes comprises selecting points in the signal constellation comprising points within a quadrilateral defined with the seed point as a center point of the quadrilateral. [0084] Clause 5: The method of any of Clauses 1 through 4, wherein generating the candidate set of codes comprises selecting points in the signal constellation as a uniform distribution within a circle defined based on a radius from the seed point. [0085] Clause 6: The method of any of Clauses 1 through 5, wherein generating the candidate set of codes comprises selecting points in the signal constellation as a uniform distribution within an ellipse defined with the seed point as a center point of the ellipse. [0086] Clause 7: The method of any of Clauses 1 through 6, wherein generating the candidate set of codes comprises selecting points in the signal constellation based on a Gaussian distribution calculated from a density function. [0087] Clause 8: The method of Clause 7, wherein parameters of the Gaussian distribution comprise parameters identified based on a Bayesian optimization. [0088] Clause 9: The method of any of Clauses 1 through 8, wherein identifying the point in the signal constellation corresponding to the value of the received signal comprises computing a log likelihood ratio over the candidate set of codes. [0089] Clause 10: The method of Clause 9, wherein the log likelihood ratio is calculated based on clipping to a maximum value associated with a signal-to-noise ratio of the received signal. [0090] Clause 11: The method of Clause 10, further comprising retrieving the maximum value from a lookup table keyed by signal-to-noise ratio values. [0091] Clause 12: The method of Clause 10 or 11, further comprising identifying the maximum value based on a Bayesian optimization. [0092] Clause 13: The method of any of Clauses 1 through 12, further comprising performing communications in the wireless communications network based on the point in the signal constellation. [0093] Clause 14: The method of any of Clauses 1 through 13, wherein the wireless communications network is a 5G network. [0094] Clause 15: The method of Clause 13 or 14, wherein the communications include voice communications in the wireless communications network. [0095] Clause 16: The method of any of Clauses 13 through 15, wherein the communications include data communications in the wireless communications network. [0096] Clause 17: The method of any of Clauses 1 through 16, wherein outputting the point comprises outputting the point for processing with one or more other points from one or more other signals in a forward error correction component of a wireless transceiver. [0097] Clause 18: A processing system, comprising: a memory comprising computer- executable instructions; and one or more processors configured to execute the computer- executable instructions and cause the processing system to perform a method in accordance with any of Clauses 1-17. [0098] Clause 19: A processing system, comprising means for performing a method in accordance with any of Clauses 1-17. [0099] Clause 20: A non-transitory computer-readable medium comprising computer-executable instructions that, when executed by one or more processors of a processing system, cause the processing system to perform a method in accordance with any of Clauses 1-17. [0100] Clause 21: A computer program product embodied on a computer-readable storage medium comprising code for performing a method in accordance with any of Clauses 1-17. Additional Considerations [0101] The preceding description is provided to enable any person skilled in the art to practice the various aspects described herein. The examples discussed herein are not limiting of the scope, applicability, or aspects set forth in the claims. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. For example, changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For instance, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Also, features described with respect to some examples may be combined in some other examples. For example, an apparatus may be implemented or a method may be practiced using any number of the aspects set forth herein. In addition, the scope of the disclosure is intended to cover such an apparatus or method that is practiced using other structure, functionality, or structure and functionality in addition to, or other than, the various aspects of the disclosure set forth herein. It should be understood that any aspect of the disclosure disclosed herein may be embodied by one or more elements of a claim. [0102] As used herein, the word “exemplary” means “serving as an example, instance, or illustration.” Any aspect described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects. [0103] As used herein, a phrase referring to “at least one of” a list of items refers to any combination of those items, including single members. As an example, “at least one of: a, b, or c” is intended to cover a, b, c, a-b, a-c, b-c, and a-b-c, as well as any combination with multiples of the same element (e.g., a-a, a-a-a, a-a-b, a-a-c, a-b-b, a-c-c, b-b, b-b-b, b-b-c, c-c, and c-c-c or any other ordering of a, b, and c). [0104] As used herein, the term “determining” encompasses a wide variety of actions. For example, “determining” may include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining, and the like. Also, “determining” may include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory), and the like. Also, “determining” may include resolving, selecting, choosing, establishing, and the like. [0105] The methods disclosed herein comprise one or more steps or actions for achieving the methods. The method steps and/or actions may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is specified, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims. Further, the various operations of methods described above may be performed by any suitable means capable of performing the corresponding functions. The means may include various hardware and/or software component(s) and/or module(s), including, but not limited to a circuit, an application specific integrated circuit (ASIC), or processor. Generally, where there are operations illustrated in figures, those operations may have corresponding counterpart means-plus-function components with similar numbering. [0106] The following claims are not intended to be limited to the aspects shown herein, but are to be accorded the full scope consistent with the language of the claims. Within a claim, reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more.” Unless specifically stated otherwise, the term “some” refers to one or more. No claim element is to be construed under the provisions of 35 U.S.C. §112(f) unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the element is recited using the phrase “step for.” All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims.