標題: | Construction Methods for Asymmetric and Multiblock Space-Time Codes |
作者: | Hollanti, Camilla Lu, Hsiao-Feng (Francis) 電信工程研究所 Institute of Communications Engineering |
關鍵字: | Asymmetric space-time block codes (ASTBCs);cyclic division algebras (CDAs);dense lattices;discriminants;diversity-multiplexing tradeoff (DMT);maximal orders;multiblock codes;multiple-input multiple-output (MIMO) channels;normalized minimum determinant |
公開日期: | 1-Mar-2009 |
摘要: | In this paper, the need for the construction of asymmetric and multiblock space-time codes is discussed. Above the trivial puncturing method, i.e., switching off the extra layers in the symmetric multiple-input multiple-output (MIMO) setting, two more sophisticated asymmetric construction methods are proposed. The first method, called the block diagonal method (BDM), can be converted to produce multiblock space-time codes that achieve the diversity-multiplexing tradeoff (DMT). It is also shown that maximizing the density of the newly proposed block diagonal asymmetric space-time (AST) codes is equivalent to minimizing the discriminant of a certain order, a result that also holds as such for the multiblock codes. An implicit lower bound for the density is provided and made explicit for an important special case that contains e.g., the systems equipped with 4Tx+2Rx antennas. Further, an explicit scheme achieving the bound is given. Another method proposed here is the Smart Puncturing Method (SPM) that generalizes the subfield construction method proposed in earlier work by Hollanti and Ranto and applies to any number of transmitting and lesser receiving antennas. The use of the general methods is demonstrated by building explicit, sphere decodable codes using different cyclic division algebras (CDAs). Computer simulations verify that the newly proposed methods can compete with the trivial puncturing method, and in some cases clearly outperform it. The conquering construction exploiting maximal orders improves upon the punctured perfect code and the DjABBA code as well as the Icosian code. Also extensive DMT analysis is provided. |
URI: | http://dx.doi.org/10.1109/TIT.2008.2011449 http://hdl.handle.net/11536/12634 |
ISSN: | 0018-9448 |
DOI: | 10.1109/TIT.2008.2011449 |
期刊: | IEEE TRANSACTIONS ON INFORMATION THEORY |
Volume: | 55 |
Issue: | 3 |
起始頁: | 1086 |
結束頁: | 1103 |
Appears in Collections: | Conferences Paper |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.