SlideShare a Scribd company logo
1 of 4
Download to read offline
Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue4, July-August 2012, pp.1900-1903
 VLSI Architecture Of MIMO Antenna System Based On Square
                       Root Algorithm
               Anuj Sha𝐰 𝟏 , Md. Azeem Hafeee𝒛 𝟐 , Dr. S. Malarvizh𝐢 𝟑
             1(Department of Electronics and communication, SRM University, Chennai - 603203
             2 (Department of Electronics and communication, SRM University, Chennai - 603203
         3 (Head of Department of Electronics and communication, SRM University, Chennai - 603203


ABSTRACT
        This paper proposes strategy based VLSI           Clock as well as other signals can be avoided,
architecture designed for estimating power                thereby saving power consumption.
consumption for the pseudo inverse of augmented                     V-BLAST (Vertical Bell Labs Layered
channel matrix used in MIMO system. MIMO                  Space Time) is an architecture proposed by Bell Labs
technology involves highly complex signal                 to use the added degrees of freedom to send separate
processing at the receiver end which is directly          signals on each transmit antenna and jointly decode
related with increased in power consumption. The          all of them with the receive antenna array [1]. This,
VLSI architecture presented in the paper is based         theoretically, increases the capacity of the channel
on Square Root Decoder algorithm. A simulation-           linearly with the number of transmit antennas as long
based analysis has been carried out to evaluate the       as the receive array is at least as large as the transmit
QR decomposition of 2x2 MIMO systems. The                 array. In VBLAST, the bottlenecks are repeated
PINV module of Square Root decoder algorithm              pseudo inverse calculation required to compute
has been designed and simulated in Xilinx System          optimal ordering and nulling vectors.
Generator tool. The total power consumed by                         The only VLSI architecture for computing a
Pseudo Inverse module is obtained as 239mW.               pseudo inverse module through the square root
                                                          algorithm has been devised in [4] in which a 3-
Keyword: MIMO, SIMULINK, SQUARE ROOT                      CORDIC based supercell proposed in [2] has been
DECODER, VBLAST, VLSI.                                    used. The architecture presented in [4] is a straight
                                                          forward implementation without regard to area and
1. INTRODUCTION                                           power optimizations. The architecture proposed in
          MULTIPLE-INPUT MULTIPLE-OUTPUT                  this paper for pseudo inverse computation exploits
(MIMO) wireless communications technology has             the parallelism inherent in Jacobi’s rotation and is
gained considerable attention in recent years due to      different and better from the architecture in [4] in that
its potential to significantly increase throughput         it uses two independent and generic pipelined
compared to traditional single-input single-output        CORDIC units instead of three [4], thereby saving
(SISO) technology. In the modern era of                   area and power. The scale correction in CORDIC
communications, the ability to send large volumes of      units in the proposed architecture is carried out
data is crucial. The weight and size are the bottleneck   through 4 shifters and an adder instead of a 16-bit
of portable electronic systems which is directly          multiplier thereby saving area and power in scale
affects power and cost impacts.                           correction.
          In CMOS, sources of power consumption
include short circuits, leakage currents and switching.   2. MIMO SYSTEM MODEL
The switching or dynamic power equation is                         In MIMO communication systems, more
described as:                                             than one antenna is used at the transmitter to transmit
                 P = k CL V 2 f    (1)                    symbols and more than one antenna is used at the
          where k represents the switching activity       receiver to receive them. In the diagram of Figure 1,
factor CL the total physical capacitance, V the supply    spatial multiplexing is used and M transmit antennas
voltage and f the frequency of operation. Algorithmic     transmit M symbols simultaneously while each
power optimization includes reduction of both             symbol is received by the N receive antennas. Each
physical capacitance and switching activity factor.       symbol transmitted is received by all the receiving
Physical capacitance can be reduced by reducing the       antennas thus making multiple channel paths. These
area of hardware through efficient implementation         paths, if combined, make a matrix of channel
[5]. Switching activity reduction either comes from       elements.
area reduction that reduces the number of nodes or                 Each symbol makes N channel paths and is
from reducing switching frequency of nodes. One of        received by N receive antennas. Since there are M
the algorithmic optimizations is reducing redundancy      symbols transmitted simultaneously, the channel
[6] from a design. By reducing the redundant              becomes a NxM matrix
operations or hardware, unnecessary switching of the


                                                                                                 1900 | P a g e
Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering
            Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1900-1903

                                                                     Here i represent iterations and i = 1… N. B
                                                              is the prearray matrix and has dimension of
                                                                                      1/2     1
                                                              (1+M+N) x (1+M) and 𝑃|0 =         𝐼, 𝐵0 = 0 𝑁𝑥𝑀 𝑒 𝑖 𝑁𝑥1
                                                                                                𝛼
                                                              is the i-th unit vector of dimension N and 𝜃 𝑖 is any
                                                              unitary transformation (Jacobi rotation) that block
                                                              lower triangularizes the pre-array denoted by M.
                                                              After N iterations,
                                                                1/2     1/2
                                                               𝑃0 = 𝑃|𝑁 𝑎𝑛𝑑 𝑄 𝑎 = 𝐵 𝑁               (6)
Figure 1: MIMO system model                                             Equations (5) and (6) are used in pseudo
                                                              inverse computation. For the rest of the algorithm,
          If s = (s1, s2,……. sM )T denotes the symbol         the reader is referred to [3].
                                                              2.2 CORDIC
vector transmitted and a vector r = (𝑟1, 𝑟2,……. 𝑟 𝑀 ) 𝑇 for
                                                                        In hardware, an efficient way of
received signal, H denotes the NxM channel matrix
                                                              accomplishing a Givens rotation is using a CORDIC.
between the receive and transmit antenna array, and v
                                                              CORDIC implements the rotation equations:
denotes the AWGN independent and identically
distributed noise vector, then the corresponding                               𝑥 ′ = cos 𝜃 𝑥 − 𝑦 tan 𝜃
receive vector r at the input of the MIMO receiver is                         𝑦 ′ = cos 𝜃 𝑦 + 𝑥 tan 𝜃    (7)
given by:                                                     When angles are selected such that:
          r = Hs + v         (2)                              tan 𝜃 = 2−𝑖            (8)
                                                                        In this case, multiplication by simply
2.1 Square Root Algorithm for V-BLAST                         becomes a right shift. When several of these
           In VBLAST, successive nulling and                  CORDIC processing elements are used together, one
cancellation is used to detect the transmitted symbols.       can rotate by an arbitrary angle by rotating by a
The channel matrix is first inverted and then                 combination of allowed angles:
reordered to detect that symbol first which has the                                𝜃 = 𝑡𝑎𝑛−1 2−𝑖 (9)
highest post detection Signal to Noise ratio (SNR).                     For a rotation using a fixed number of
This corresponds to the row of the inverted channel           iterations the terms turn out to be a constant. The
matrix having minimum Euclidean distance. The                 constant scaling value can be seen in [6] for up to 15
symbol after detection is subtracted from the received        iterations. For our design we need the CORDIC to
symbol vector. The corresponding column of the H              first rotate a vector to the nulling axis and then
matrix is zeroed down and the process is repeated             remember the angle rotated to following vectors can
with the deflated channel matrix until all the symbols        be rotated to the same angle. These two modes of
are detected. In this research, MMSE is used for              operation are known as vectoring and rotation,
channel inversion. The pseudo inverse of a generic            respectively. The design of our CORDIC
matrix H is given by                                          implemented the rotation equations (7) using the
      𝐻 + = (𝐻 ∗ 𝐻)−1 𝐻 ∗ = 𝑅−1 𝑄∗ (3)                        constraint on angles in (9) such that our final result
           The pseudo inverse can be computed using           nulls𝑦 ′. We also needed to design a CORDIC that
either singular value decomposition (SVD) or QR               operates in vectoring and rotation mode.
decomposition. The square root algorithm [3] is                         In order to implement the equations, we
developed for MMSE-VBLAST and computes the                    used shifters and adders to do the bulk of the work
QR decomposition of the augmented channel matrix.             along with simple decision logic. Each processing
    𝐻 𝑁𝑥𝑀             𝑄 𝑎𝑁𝑥𝑀 𝑅 𝑀𝑥𝑀 (4)                        element receives two input vectors and finds their
         𝑀𝑥𝑀 = QR =                                           sign. It must now decide based on their signs whether
    𝛼 𝐼                   𝑥
           Here x denotes the entries that are not            to rotate up or down.
relevant. The algorithm first decomposes the channel
matrix into QR 𝑎 𝑟 + 𝑗 𝑎1 and then computes 𝑃1/2 =
 𝑅−1 . Once 𝑄 𝑎 and 𝑃1/2 are computed, the repeated
pseudo inverse can be avoided. The algorithm is
described below:
1)         Compute 𝑄 𝑎 and 𝑃1/2 using equation (5):

B𝜀 𝑖 = X            (5)

                     1/2
           1     𝐻 𝑖 𝑃 𝑖−1
                     |          𝑥   01𝑥𝑀
                    1/2                1/2
B= 0       𝑀𝑥1
                  𝑃| 𝑖−1     X= 𝑥    𝑃| 𝑖−1
     −𝑒 𝑖 𝑁𝑥1     𝐵 𝑖−1         𝑥       𝐵𝑖
                                                               Figure 2: VLSI architecture for Pseudo Inverse [4]

                                                                                                    1901 | P a g e
Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue4, July-August 2012, pp.1900-1903




Figure 3: Conventional MAC Module

         The main design platform used during this      Figure 6: Device family and package used for Pseudo
project was SIMULINK. It is a tool-flow that enables    inverse Module
the use and creation of high level block diagrams          It is clear from Fig. 7 (b) that in Pseudo Inverse
which can be used for simulation, emulation, and        Module, CORDIC has used two third of the chip
hardware description. The blocks used in this design    area. However area use by Flip-Flops, Look Up table
were from the Xilinx block set. Based on Xilinx         etc. can be viewed by the figure provided below in
block set the architecture of Pseudo Inverse is         Fig. 7(a).
designed and can be seen as follows:




 Figure 4: VLSI architecture for Pseudo Inverse
designed by Xilinx Blocksets.
                                                                                  (a)
3. RESULTS
         Every block was tested extensively in
simulation. Testing was done by performing the
algorithm for that block in MATLAB, Xilinx System
Generator and Xilinx ISE to obtain the expected
values given certain data. The blocks were then given
the same inputs as the algorithm was given in
MATLAB, simulation was run, and the outputs of the
blocks were reviewed. All of the blocks performed as
desired, given several known test inputs of a wide
range. The total power consumed by Pseudo Inverse
module is obtained as 239mW.
                                                                                  (b)
                                                        Figure 7: (a) Area utilization summary for Pseudo
                                                        inverse Module (b) layout of Pseudo Inverse module

                                                        4. CONCLUSION
                                                                 Instead of QR triangular array that employs
                                                        large number processors, single processor based
                                                        VLSI architecture is proposed for V-BLAST
Figure 5: Power Analysis of PINV Module                 detection. The quantization scheme of the square root
                                                        algorithm for V-BLAST detection is presented
                                                        considering the tradeoff between the hardware
                                                        complexity and the performance. The proposed

                                                                                             1902 | P a g e
Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering
           Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue4, July-August 2012, pp.1900-1903
architecture is implemented in SIMULINK used by               Journal of Theoretical and Applied
special sets of XILINX block sets. While the full             Information Technology, 2005-2010 JATIT.
Square Root algorithm was not designed, the major       [9]   VLSI Design of the Square-Root Algorithm
computationally complex parts were. Finding 𝑝1/2              for a Linear MMSE V-BLAST Detector
enables one to easily perform SIC and subsequently            with SIC. “Akin Olugbade, Prof. Borivoje
decode information streams in V-BLAST                         Nikolic, Vinayak Nagpal”, SUPERB-CSIS
architecture.                                                 2008.
          The future work will be addressed to design
and implement other module of square root algorithm
like SORT and NULL for power analysis and area
utilization.

ACKNOWLEDGEMENT
         The author would like to thank the
contributions of the faculty of the SRM University.

REFERENCES
Proceedings Papers:
  [1]   G. J. Foshini: Layered space-time
        architecture for wireless communication in a
        fading environment when using multi-
        element antennas. Bell Labs technical
        Journal, pages 41-57, Autumn 1996
  [2]   R.Andraka: A Survey of CORDIC algorithm
        for FPGAs, FPGA’98. Proceeding of the
        1998 ACM/SIGDA sixth international
        symposium on Field programmable gate
        arrays, Feb. 22-24, 1998, Monterey, CA.
        pp191-2000
  [3]   Babak Hassibi: An Efficient Square-Root
        Algorithm for BLAST”, http://mars.bell-
        labs.com/
  [4]   Z.Guo and P. Nilson: A VLSI
        implementation of MIMO detection for
        future wireless communications, in Proc.
        IEEE PIMRC’03, vol. 3, 2003, pp. 2852-
        2856
  [5]   M.Pedram,”Power Minimisation in IC
        Design: Principles and Applications”, ACM
        Transactions on Design Automation of
        Electronic Systems, vol. 1, no. 1, pp. 3-56,
        January 1996.
  [6]   X. Wu, M. Pedram, L. Wang, “Multi code
        state assignment for low power design”,
        Circuits, Devices and Systems, IEEE
        Proceedings vol. 147, Issue 5, Oct. 2000
        Page(s):271 - 275
  [7]   Area & Power Efficient VLSI Architecture
        for Computing Pseudo Inverse of Channel
        Matrix in a MIMO Wireless System, Zahid
        Khan, Tughrul Arslan, John S. Thompson,
        Ahmet T. Erdogan, Proceedings of the 19th
        International Conference on VLSI Design
        (VLSID’06).
  Journal Papers:
  [8]   Nirmalendu Bikas Sinha, R.Bera and
        M.Mitra:      Capacity     and   V-BLAST
        techniques for MIMO wireless channel,




                                                                                       1903 | P a g e

More Related Content

What's hot

IRJET- Design of Memristor based Multiplier
IRJET- Design of Memristor based MultiplierIRJET- Design of Memristor based Multiplier
IRJET- Design of Memristor based MultiplierIRJET Journal
 
Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Editor IJARCET
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticNexgen Technology
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
Design of Quaternary Logical Circuit Using Voltage and Current Mode Logic
Design of Quaternary Logical Circuit Using Voltage and Current Mode LogicDesign of Quaternary Logical Circuit Using Voltage and Current Mode Logic
Design of Quaternary Logical Circuit Using Voltage and Current Mode LogicVLSICS Design
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticIeee Xpert
 
Hawaii Swnt Ao
Hawaii Swnt AoHawaii Swnt Ao
Hawaii Swnt AoAntonini
 

What's hot (16)

Design Radix-4 64-Point Pipeline FFT/IFFT Processor for Wireless Application
Design Radix-4 64-Point Pipeline FFT/IFFT Processor for Wireless ApplicationDesign Radix-4 64-Point Pipeline FFT/IFFT Processor for Wireless Application
Design Radix-4 64-Point Pipeline FFT/IFFT Processor for Wireless Application
 
Fx3111501156
Fx3111501156Fx3111501156
Fx3111501156
 
Cg24551555
Cg24551555Cg24551555
Cg24551555
 
IRJET- Design of Memristor based Multiplier
IRJET- Design of Memristor based MultiplierIRJET- Design of Memristor based Multiplier
IRJET- Design of Memristor based Multiplier
 
1
11
1
 
15
1515
15
 
Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmetic
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Design of Quaternary Logical Circuit Using Voltage and Current Mode Logic
Design of Quaternary Logical Circuit Using Voltage and Current Mode LogicDesign of Quaternary Logical Circuit Using Voltage and Current Mode Logic
Design of Quaternary Logical Circuit Using Voltage and Current Mode Logic
 
Lect5 v2
Lect5 v2Lect5 v2
Lect5 v2
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmetic
 
P410498102
P410498102P410498102
P410498102
 
Jc2415921599
Jc2415921599Jc2415921599
Jc2415921599
 
Hawaii Swnt Ao
Hawaii Swnt AoHawaii Swnt Ao
Hawaii Swnt Ao
 

Viewers also liked (20)

Kr2418101813
Kr2418101813Kr2418101813
Kr2418101813
 
Nv2422562263
Nv2422562263Nv2422562263
Nv2422562263
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Ls2419601967
Ls2419601967Ls2419601967
Ls2419601967
 
Lx2419861991
Lx2419861991Lx2419861991
Lx2419861991
 
Ln2419351940
Ln2419351940Ln2419351940
Ln2419351940
 
Mg2420312033
Mg2420312033Mg2420312033
Mg2420312033
 
Mi2420432050
Mi2420432050Mi2420432050
Mi2420432050
 
Na2421422147
Na2421422147Na2421422147
Na2421422147
 
Md2420142018
Md2420142018Md2420142018
Md2420142018
 
M24098107
M24098107M24098107
M24098107
 
Ml2420602065
Ml2420602065Ml2420602065
Ml2420602065
 
Ob2422972301
Ob2422972301Ob2422972301
Ob2422972301
 
Lm2419291934
Lm2419291934Lm2419291934
Lm2419291934
 
Mt2421032111
Mt2421032111Mt2421032111
Mt2421032111
 
Nz2422822287
Nz2422822287Nz2422822287
Nz2422822287
 
Mj2420512054
Mj2420512054Mj2420512054
Mj2420512054
 
Ej31898902
Ej31898902Ej31898902
Ej31898902
 
Nais v4
Nais v4Nais v4
Nais v4
 
Pol Josep Mª El Baix Empordà
Pol Josep Mª El Baix EmpordàPol Josep Mª El Baix Empordà
Pol Josep Mª El Baix Empordà
 

Similar to Lh2419001903

Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...ijsrd.com
 
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX ApplicationsA CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX ApplicationsIDES Editor
 
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiverIaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiverIaetsd Iaetsd
 
Ber performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalizationBer performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalizationAlexander Decker
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...IOSR Journals
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...IOSR Journals
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...IOSR Journals
 
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...CSCJournals
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
 
Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...IJCNCJournal
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
Simulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlabSimulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlabIJARBEST JOURNAL
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482IJRAT
 
Optical Spatial Modulation with Transmitter-Receiver Alignments
Optical Spatial Modulation with Transmitter-Receiver AlignmentsOptical Spatial Modulation with Transmitter-Receiver Alignments
Optical Spatial Modulation with Transmitter-Receiver AlignmentsMarwan Hammouda
 
MIMO Channel Estimation Using the LS and MMSE Algorithm
MIMO Channel Estimation Using the LS and MMSE AlgorithmMIMO Channel Estimation Using the LS and MMSE Algorithm
MIMO Channel Estimation Using the LS and MMSE AlgorithmIOSRJECE
 

Similar to Lh2419001903 (20)

Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation ...
 
Nc2421532161
Nc2421532161Nc2421532161
Nc2421532161
 
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX ApplicationsA CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
 
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiverIaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiver
 
K010217785
K010217785K010217785
K010217785
 
Ber performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalizationBer performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalization
 
MIMO Communications
MIMO CommunicationsMIMO Communications
MIMO Communications
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
 
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
 
H44093641
H44093641H44093641
H44093641
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
 
7
77
7
 
Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
Simulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlabSimulation of an adaptive digital beamformer using matlab
Simulation of an adaptive digital beamformer using matlab
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482
 
Optical Spatial Modulation with Transmitter-Receiver Alignments
Optical Spatial Modulation with Transmitter-Receiver AlignmentsOptical Spatial Modulation with Transmitter-Receiver Alignments
Optical Spatial Modulation with Transmitter-Receiver Alignments
 
MIMO Channel Estimation Using the LS and MMSE Algorithm
MIMO Channel Estimation Using the LS and MMSE AlgorithmMIMO Channel Estimation Using the LS and MMSE Algorithm
MIMO Channel Estimation Using the LS and MMSE Algorithm
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Lh2419001903

  • 1. Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1900-1903 VLSI Architecture Of MIMO Antenna System Based On Square Root Algorithm Anuj Sha𝐰 𝟏 , Md. Azeem Hafeee𝒛 𝟐 , Dr. S. Malarvizh𝐢 𝟑 1(Department of Electronics and communication, SRM University, Chennai - 603203 2 (Department of Electronics and communication, SRM University, Chennai - 603203 3 (Head of Department of Electronics and communication, SRM University, Chennai - 603203 ABSTRACT This paper proposes strategy based VLSI Clock as well as other signals can be avoided, architecture designed for estimating power thereby saving power consumption. consumption for the pseudo inverse of augmented V-BLAST (Vertical Bell Labs Layered channel matrix used in MIMO system. MIMO Space Time) is an architecture proposed by Bell Labs technology involves highly complex signal to use the added degrees of freedom to send separate processing at the receiver end which is directly signals on each transmit antenna and jointly decode related with increased in power consumption. The all of them with the receive antenna array [1]. This, VLSI architecture presented in the paper is based theoretically, increases the capacity of the channel on Square Root Decoder algorithm. A simulation- linearly with the number of transmit antennas as long based analysis has been carried out to evaluate the as the receive array is at least as large as the transmit QR decomposition of 2x2 MIMO systems. The array. In VBLAST, the bottlenecks are repeated PINV module of Square Root decoder algorithm pseudo inverse calculation required to compute has been designed and simulated in Xilinx System optimal ordering and nulling vectors. Generator tool. The total power consumed by The only VLSI architecture for computing a Pseudo Inverse module is obtained as 239mW. pseudo inverse module through the square root algorithm has been devised in [4] in which a 3- Keyword: MIMO, SIMULINK, SQUARE ROOT CORDIC based supercell proposed in [2] has been DECODER, VBLAST, VLSI. used. The architecture presented in [4] is a straight forward implementation without regard to area and 1. INTRODUCTION power optimizations. The architecture proposed in MULTIPLE-INPUT MULTIPLE-OUTPUT this paper for pseudo inverse computation exploits (MIMO) wireless communications technology has the parallelism inherent in Jacobi’s rotation and is gained considerable attention in recent years due to different and better from the architecture in [4] in that its potential to significantly increase throughput it uses two independent and generic pipelined compared to traditional single-input single-output CORDIC units instead of three [4], thereby saving (SISO) technology. In the modern era of area and power. The scale correction in CORDIC communications, the ability to send large volumes of units in the proposed architecture is carried out data is crucial. The weight and size are the bottleneck through 4 shifters and an adder instead of a 16-bit of portable electronic systems which is directly multiplier thereby saving area and power in scale affects power and cost impacts. correction. In CMOS, sources of power consumption include short circuits, leakage currents and switching. 2. MIMO SYSTEM MODEL The switching or dynamic power equation is In MIMO communication systems, more described as: than one antenna is used at the transmitter to transmit P = k CL V 2 f (1) symbols and more than one antenna is used at the where k represents the switching activity receiver to receive them. In the diagram of Figure 1, factor CL the total physical capacitance, V the supply spatial multiplexing is used and M transmit antennas voltage and f the frequency of operation. Algorithmic transmit M symbols simultaneously while each power optimization includes reduction of both symbol is received by the N receive antennas. Each physical capacitance and switching activity factor. symbol transmitted is received by all the receiving Physical capacitance can be reduced by reducing the antennas thus making multiple channel paths. These area of hardware through efficient implementation paths, if combined, make a matrix of channel [5]. Switching activity reduction either comes from elements. area reduction that reduces the number of nodes or Each symbol makes N channel paths and is from reducing switching frequency of nodes. One of received by N receive antennas. Since there are M the algorithmic optimizations is reducing redundancy symbols transmitted simultaneously, the channel [6] from a design. By reducing the redundant becomes a NxM matrix operations or hardware, unnecessary switching of the 1900 | P a g e
  • 2. Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1900-1903 Here i represent iterations and i = 1… N. B is the prearray matrix and has dimension of 1/2 1 (1+M+N) x (1+M) and 𝑃|0 = 𝐼, 𝐵0 = 0 𝑁𝑥𝑀 𝑒 𝑖 𝑁𝑥1 𝛼 is the i-th unit vector of dimension N and 𝜃 𝑖 is any unitary transformation (Jacobi rotation) that block lower triangularizes the pre-array denoted by M. After N iterations, 1/2 1/2 𝑃0 = 𝑃|𝑁 𝑎𝑛𝑑 𝑄 𝑎 = 𝐵 𝑁 (6) Figure 1: MIMO system model Equations (5) and (6) are used in pseudo inverse computation. For the rest of the algorithm, If s = (s1, s2,……. sM )T denotes the symbol the reader is referred to [3]. 2.2 CORDIC vector transmitted and a vector r = (𝑟1, 𝑟2,……. 𝑟 𝑀 ) 𝑇 for In hardware, an efficient way of received signal, H denotes the NxM channel matrix accomplishing a Givens rotation is using a CORDIC. between the receive and transmit antenna array, and v CORDIC implements the rotation equations: denotes the AWGN independent and identically distributed noise vector, then the corresponding 𝑥 ′ = cos 𝜃 𝑥 − 𝑦 tan 𝜃 receive vector r at the input of the MIMO receiver is 𝑦 ′ = cos 𝜃 𝑦 + 𝑥 tan 𝜃 (7) given by: When angles are selected such that: r = Hs + v (2) tan 𝜃 = 2−𝑖 (8) In this case, multiplication by simply 2.1 Square Root Algorithm for V-BLAST becomes a right shift. When several of these In VBLAST, successive nulling and CORDIC processing elements are used together, one cancellation is used to detect the transmitted symbols. can rotate by an arbitrary angle by rotating by a The channel matrix is first inverted and then combination of allowed angles: reordered to detect that symbol first which has the 𝜃 = 𝑡𝑎𝑛−1 2−𝑖 (9) highest post detection Signal to Noise ratio (SNR). For a rotation using a fixed number of This corresponds to the row of the inverted channel iterations the terms turn out to be a constant. The matrix having minimum Euclidean distance. The constant scaling value can be seen in [6] for up to 15 symbol after detection is subtracted from the received iterations. For our design we need the CORDIC to symbol vector. The corresponding column of the H first rotate a vector to the nulling axis and then matrix is zeroed down and the process is repeated remember the angle rotated to following vectors can with the deflated channel matrix until all the symbols be rotated to the same angle. These two modes of are detected. In this research, MMSE is used for operation are known as vectoring and rotation, channel inversion. The pseudo inverse of a generic respectively. The design of our CORDIC matrix H is given by implemented the rotation equations (7) using the 𝐻 + = (𝐻 ∗ 𝐻)−1 𝐻 ∗ = 𝑅−1 𝑄∗ (3) constraint on angles in (9) such that our final result The pseudo inverse can be computed using nulls𝑦 ′. We also needed to design a CORDIC that either singular value decomposition (SVD) or QR operates in vectoring and rotation mode. decomposition. The square root algorithm [3] is In order to implement the equations, we developed for MMSE-VBLAST and computes the used shifters and adders to do the bulk of the work QR decomposition of the augmented channel matrix. along with simple decision logic. Each processing 𝐻 𝑁𝑥𝑀 𝑄 𝑎𝑁𝑥𝑀 𝑅 𝑀𝑥𝑀 (4) element receives two input vectors and finds their 𝑀𝑥𝑀 = QR = sign. It must now decide based on their signs whether 𝛼 𝐼 𝑥 Here x denotes the entries that are not to rotate up or down. relevant. The algorithm first decomposes the channel matrix into QR 𝑎 𝑟 + 𝑗 𝑎1 and then computes 𝑃1/2 = 𝑅−1 . Once 𝑄 𝑎 and 𝑃1/2 are computed, the repeated pseudo inverse can be avoided. The algorithm is described below: 1) Compute 𝑄 𝑎 and 𝑃1/2 using equation (5): B𝜀 𝑖 = X (5) 1/2 1 𝐻 𝑖 𝑃 𝑖−1 | 𝑥 01𝑥𝑀 1/2 1/2 B= 0 𝑀𝑥1 𝑃| 𝑖−1 X= 𝑥 𝑃| 𝑖−1 −𝑒 𝑖 𝑁𝑥1 𝐵 𝑖−1 𝑥 𝐵𝑖 Figure 2: VLSI architecture for Pseudo Inverse [4] 1901 | P a g e
  • 3. Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1900-1903 Figure 3: Conventional MAC Module The main design platform used during this Figure 6: Device family and package used for Pseudo project was SIMULINK. It is a tool-flow that enables inverse Module the use and creation of high level block diagrams It is clear from Fig. 7 (b) that in Pseudo Inverse which can be used for simulation, emulation, and Module, CORDIC has used two third of the chip hardware description. The blocks used in this design area. However area use by Flip-Flops, Look Up table were from the Xilinx block set. Based on Xilinx etc. can be viewed by the figure provided below in block set the architecture of Pseudo Inverse is Fig. 7(a). designed and can be seen as follows: Figure 4: VLSI architecture for Pseudo Inverse designed by Xilinx Blocksets. (a) 3. RESULTS Every block was tested extensively in simulation. Testing was done by performing the algorithm for that block in MATLAB, Xilinx System Generator and Xilinx ISE to obtain the expected values given certain data. The blocks were then given the same inputs as the algorithm was given in MATLAB, simulation was run, and the outputs of the blocks were reviewed. All of the blocks performed as desired, given several known test inputs of a wide range. The total power consumed by Pseudo Inverse module is obtained as 239mW. (b) Figure 7: (a) Area utilization summary for Pseudo inverse Module (b) layout of Pseudo Inverse module 4. CONCLUSION Instead of QR triangular array that employs large number processors, single processor based VLSI architecture is proposed for V-BLAST Figure 5: Power Analysis of PINV Module detection. The quantization scheme of the square root algorithm for V-BLAST detection is presented considering the tradeoff between the hardware complexity and the performance. The proposed 1902 | P a g e
  • 4. Anuj Shaw, Md. Azeem Hafeeez, Dr. S. Malarvizhi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1900-1903 architecture is implemented in SIMULINK used by Journal of Theoretical and Applied special sets of XILINX block sets. While the full Information Technology, 2005-2010 JATIT. Square Root algorithm was not designed, the major [9] VLSI Design of the Square-Root Algorithm computationally complex parts were. Finding 𝑝1/2 for a Linear MMSE V-BLAST Detector enables one to easily perform SIC and subsequently with SIC. “Akin Olugbade, Prof. Borivoje decode information streams in V-BLAST Nikolic, Vinayak Nagpal”, SUPERB-CSIS architecture. 2008. The future work will be addressed to design and implement other module of square root algorithm like SORT and NULL for power analysis and area utilization. ACKNOWLEDGEMENT The author would like to thank the contributions of the faculty of the SRM University. REFERENCES Proceedings Papers: [1] G. J. Foshini: Layered space-time architecture for wireless communication in a fading environment when using multi- element antennas. Bell Labs technical Journal, pages 41-57, Autumn 1996 [2] R.Andraka: A Survey of CORDIC algorithm for FPGAs, FPGA’98. Proceeding of the 1998 ACM/SIGDA sixth international symposium on Field programmable gate arrays, Feb. 22-24, 1998, Monterey, CA. pp191-2000 [3] Babak Hassibi: An Efficient Square-Root Algorithm for BLAST”, http://mars.bell- labs.com/ [4] Z.Guo and P. Nilson: A VLSI implementation of MIMO detection for future wireless communications, in Proc. IEEE PIMRC’03, vol. 3, 2003, pp. 2852- 2856 [5] M.Pedram,”Power Minimisation in IC Design: Principles and Applications”, ACM Transactions on Design Automation of Electronic Systems, vol. 1, no. 1, pp. 3-56, January 1996. [6] X. Wu, M. Pedram, L. Wang, “Multi code state assignment for low power design”, Circuits, Devices and Systems, IEEE Proceedings vol. 147, Issue 5, Oct. 2000 Page(s):271 - 275 [7] Area & Power Efficient VLSI Architecture for Computing Pseudo Inverse of Channel Matrix in a MIMO Wireless System, Zahid Khan, Tughrul Arslan, John S. Thompson, Ahmet T. Erdogan, Proceedings of the 19th International Conference on VLSI Design (VLSID’06). Journal Papers: [8] Nirmalendu Bikas Sinha, R.Bera and M.Mitra: Capacity and V-BLAST techniques for MIMO wireless channel, 1903 | P a g e