3.4 Approximate non-coherent ML detection
3.4.3 Computing the PEP
3.2. Let φbe vector of phases of components of Lr. If 2πm−πq ≤φi < 2πm+πq ,1≤i≤ T, m is an integer, then ˆφi = 2πmq .
3.3. If Obj≤Tr(XX∗φˆφˆ∗) then Obj = Tr(XX∗φˆφˆ∗) and ¯φ= ˆφ.
3.4. count = count + 1.
4. If count≤10 go to 3.
5. Let ˆφ= ¯φ, ˆs= e√jφˆ T.
6. Solve (3.44). Let ¯sbe the solution.
[Remark: We used 10 rounding iterations in the description of the SDPLS algorithm.
We would like to emphasize that there is no particular reason which would explain what is the optimal number of these iterations. We used 10 and obtained decent performance.]
Roughly speaking, the main idea of the SDPLS algorithm is to improve on SDP by doing an additional limited search over the codewords which have the squared inner product with ˆ
sgreater than α. With this improvement we will be able to provide sound proofs regarding the coding loss of the SDP relaxation in the following section.
algorithm and refer to it as theGenie. Its solution ˆs1 is such that
if |ˆs∗st|2< α ˆs1 = ˆs
if |ˆs∗st|2≥α ˆs1 = ¯s (3.46)
where ˆs is as found in (3.38). The probability of error for the Geniealgorithm is given by
Peg=
qT
X
i=1,i6=t
Pg(error|stis sent)P(stis sent) (3.47)
where Pg(error|stis sent) denotes the probability that an error occurred if the codeword st was sent and Genie algorithm was applied. Clearly, our SDPLS algorithm will have smaller probability of error than the Genie. Namely, the Genie and SDPLS differ in the case when|ˆs∗st|< α. TheGeniekeeps ˆsas a solution which is incorrect since|ˆs∗st|< α <1 implies ˆs 6= st. Since in the only case when they differ Genie certainly makes a mistake, it can not have smaller probability of error than SDPLS. Therefore if we prove that Genie attains a certain probability of error, then SDPLS does so too. Hence, we concentrate on bounding the probability of error of the Genie, i.e., on bounding Pg(error|stis sent). The bound obtained this way will also be a bound on the probability of error of the SDPLS. To this end, note that
Pg(error|stis sent) =P(ˆs1 6=st) =P(∃i: ˆs1 =si6=st)≤ X
si6=st
P(ˆs1 =si 6=st)
≤ X
|s∗ist|2<α
P(ˆs1 =si6=st) + X
|s∗ist|2≥α
P(ˆs1 =si6=st). (3.48)
Let us considerP(ˆs1 =si6=st,|s∗ist|2 < α) in more detail. (For brevity of notation, in the following expressions we omit that everything is conditioned on st being transmitted, and that|s∗ist|2 < α.) So,
P(ˆs1=si 6=st) =P(ˆs1 =si6=st|ˆs1 = ˆs)P(ˆs1= ˆs) +P(ˆs1 =si 6=st,ˆs16= ˆs). (3.49)
Let us define function C as C(s) = TrXX∗ss∗. Furthermore, let E denote the event that (ˆs1 =si 6=st,ˆs1 6= ˆs). Clearly,E implies that C(si) =C(ˆs1)≥C(ˆs)≥αC(sML)≥αC(st), which further means that C(si) ≥ αC(st). Using this, we obtain P(ˆs1 = si 6= st,ˆs1 6= ˆs) ≤ P(C(si) ≥ αC(st)). Also, following similar argument, it is not difficult to see that P(ˆs1 =si 6=st|ˆs1 = ˆs)P(ˆs1= ˆs))≤P(C(si)≥αC(st)). Replacing the obtained inequalities in (3.49) we have
P(ˆs1 =si 6=st,|s∗ist|2 < α)≤2P(C(si)≥αC(st)). (3.50)
Now, let us consider P(ˆs1=si 6=st,|s∗ist|2 ≥α). It is not that difficult to see that
P(ˆs1 =si 6=st,|s∗ist|2 ≥α) ≤P(C(si)≥C(st)). (3.51)
In order to precisely establish (3.51) we need the following implication
(ˆs1 =si6=st,|s∗ist| ≥α) =⇒ |ˆs∗st| ≥α.
We will show that the previous implication holds using a contradiction argument. Assume that it is not correct. Then it means that (ˆs1 =si6=st,|s∗ist| ≥α) is true and |ˆs∗st| ≥α is not true. If|ˆs∗st| ≥αis not true then|ˆs∗st|< αis true. Then ˆs1= ˆsis true as well. Further we have si = ˆs1 = ˆs and |s∗ist| =|ˆs∗st| < α. This is a contradiction since it was assumed that (ˆs1 =si6=st,|s∗ist| ≥α) is true and hence|s∗ist| ≥α. Therefore the implication
(ˆs1 =si6=st,|s∗ist| ≥α) =⇒ |ˆs∗st| ≥α.
is indeed true.
Substituting (3.50) and (3.51) in (3.48), we finally obtain
Pg(error|stis sent)≤ X
|s∗ist|2≤α
2P(C(si)≥αC(st)) + X
|s∗ist|2≥α
P(C(si)≥C(st)). (3.52)
Let
Pit||s∗
ist|2<α = P(C(si)≥αC(st)|stis sent,|s∗ist|2 < α) Pit||s∗
ist|2≥α = P(C(si)≥ C(st)|st is sent,|s∗ist|2 ≥α).
In the remainder of this section, we compute bounds onPit||s∗
ist|2<α and Pit||s∗
ist|2≥α. Pit||s∗
ist|2<α=P(Tr(X∗si)(X∗si)∗≥αTr(X∗st)(X∗st)∗|st is sent). (3.53) Since we assume that st was transmitted, it holds that X =√
ksth+W where, as earlier, k=ρT. Replacing this value for X in (3.53), we obtain
Pit||s∗
ist|2<α=P(Tr(
h W
∗
Qn
h W
≥0|st is sent), (3.54)
where
Qn =
√ks∗t
I
(sis∗i −αsts∗t) √
kst I
=
√ks∗t
I
si st
1 0 0 −α
s∗i s∗t
√
kst I
=
√kψ∗it √ k si st
1 0 0 −α
√kψit s∗i
√k s∗t
,
and ψit =s∗ist. Although it is possible to compute explicitly the probability in (3.54), we will find that it is sufficient to find its Chernoff bound. In particular,
Pit||s∗
ist|2<α ≤min
µ Ee
µ(Tr( 2 66 64
h W
3 77 75
∗
Qn
2 66 64
h W
3 77 75))
= Z e
−Tr( 2 66 64
h W
3 77 75
∗
(I−µQn) 2 66 64
h W
3 77 75)
dhdW
πN = 1
det(I −µQn)N
where{µ|I−µQn≥0}. We first simplify the determinant in the denominator as
det(I−µQn) = det(I−µ
kψitψit∗ + 1 (k+ 1)ψit
−α(k+ 1)ψ∗it −α(k+ 1)1
).
After some further algebraic transformations we obtain
det(I−µQn) = (k+ 1)α(V(it)−1)(−µ+ξ(1))(−µ+ξ(2))
with
ξ(1) = V(it)−α+1−kα + q
(V(it)−α+1−kα)2+4α(1−Vk(it)2 )(k+1)
2α(V(it)−1)k+1k ξ(2) = V(it)−α+1−kα −
q
(V(it)−α+1−kα)2+4α(1−Vk(it)2 )(k+1)
2α(V(it)−1)k+1k
and V(it) = ψitψ∗it. As earlier, our results can be made precise so that they hold for any SNR. However, to make writing less tedious in the rest of this section we consider only the case of large SNR. Assumingµ= 12, the previous results simplify to
Pit||s∗
ist|2<α≤ 1 (k(α−V(it))2
4(1−V(it)))N. (3.55)
To compute the bound on P(C(si) ≥ C(st)|stis sent,|s∗ist|2 ≥α) we will use a well-known result from the literature (see, e.g., [51])
Pit||s∗
ist|2≥α ≤ 1
(k(1−V4(it)))N. (3.56) Now we can substitute the results from (3.55) and (3.56) in (3.52) and obtain
Pg(error|stis sent)≤ X
|s∗ist|2<α
2 1
(k(α−V(it))2
4(1−V(it)))N + X
|s∗ist|2≥α
1
(k(1−V4(it)))N =Bpep(ρ). (3.57) Recall that in the case of the exact ML detection, which requires algorithms, none of which
are of polynomial complexity, we have for the same probability of error
PM L(error|stis sent)≤ X
|s∗ist|2<α
1 (k(1−V4(it)))N
+ X
|s∗ist|2≥α
1 (k(1−V4(it)))N
=BpepM L(ρ). (3.58)
Clearly, comparing (3.57) and (3.58) it follows that the SDPLS algorithm based on the well- known SDP relaxation (slightly refined here for the purposes of the valid proof) has thesame diversity as the exact ML and the AR algorithm. Of course, since the SDPLS algorithm is only an approximation, the exact ML solution still has an advantage of (1−V(it)
α−V(it))2 in the coding gain. However, as the analysis conducted in Section 3.2 hints (and the simulation result on Figure 3.6 confirms) the AR algorithm has a significantly bigger coding loss than the SDPLS algorithm analyzed in this section.
It should also be noted that a very similar result related to the diversity of the SDP- based algorithm in the context of coherent (channel known at the receiver) ML detection has recently been shown in [60].
We summarize the previous results in the following theorem.
Theorem 3.4. Consider the problem of non-coherent ML detection for a SIMO system described in (3.1) in high-SNR regime. Assume that the codeword st was transmitted. Then the probability that an error occurred if SDPLS algorithm was applied to solve (3.34) can be upper bounded in the following way
P(error|stis sent)≤ X
|s∗ist|2<α
2 1
(ρT(α4(1−V(it))2
−V(it)))N
+ X
|s∗ist|2≥α
1 (ρT(1−V4(it)))N
.
Proof. Follows from the previous discussion.