This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Low-Complexity Codebook Design for SCMA based Visible Light Communication

Saumya Chaturvedi  Dil Nashin Anwar  Vivek Ashok Bohara  Anand Srivastava  Zilong Liu
Saumya Chaturvedi, Dil Nashin Anwar, Vivek Ashok Bohara, and Anand Srivastava are with Indraprastha Institute of Information Technology (IIIT-Delhi), Delhi, New Delhi, 110020, India (e-mail: {saumyac, dilnashina, vivek.b, anand}@iiitd.ac.in). Zilong Liu is with the School of Computer Science and Electrical Engineering, University of Essex, Colchester CO4 3SQ, U.K. (e-mail: zilong.liu@essex.ac.uk).
Abstract

Sparse code multiple access (SCMA), as a code-domain non-orthogonal multiple access (NOMA) scheme, has received considerable research attention for enabling massive connectivity in future wireless communication systems. In this paper, we present a novel codebook (CB) design for SCMA based visible light communication (VLC) system, which suffers from shot noise. In particular, we introduce an iterative algorithm for designing and optimizing CB by considering the impact of shot noise at the VLC receiver. Based on the proposed CB, we derive and analyze the theoretical bit error rate (BER) expression for the resultant SCMA-VLC system. The simulation results show that our proposed CBs outperform CBs in the existing literature for different loading factors with much less complexity. Further, the derived analytical BER expression well aligns with simulated results, especially in high signal power regions.

Index Terms:
CB Design, Input-Dependent Gaussian Noise (IDGN), Sparse Code Multiple Access (SCMA), Visible Light Communication (VLC).

I INTRODUCTION

In recent years, visible light communication (VLC) has emerged as a reliable alternative to legacy radio-frequency (RF) based communication, especially for indoor scenarios. VLC offers various advantages such as unlicensed spectrum, free of electromagnetic interference, and ease of deployment using existing illumination infrastructure along with high-level security [1, 2, 3]. Besides, non-orthogonal multiple access (NOMA) has received increasing research attention in the past few years as a key technology for the enabling of massive machine type communication (mMTC) systems, in which a massive number of devices with very high density needs to be served [4], [5]. The primary concept behind NOMA is to serve multiple users over the same resource elements (frequency or time slots) using different codebooks (CBs) or power levels. This paper is concerned with the integration of VLC with a disruptive NOMA scheme, called sparse code multiple access (SCMA), where multiple users are served simultaneously with different sparsity structures of the CBs [6]. Message passing algorithm (MPA) is used for multi-user detection by taking advantage of the sparse CBs [7]. In SCMA, CB design plays a key role in the enhanced error rate performances [8].

To support multiple access in VLC, conventional orthogonal frequency division multiple access (OFDMA) may not be employed as VLC has the requirement of real and positive signal transmission. In order to overcome the above drawback, direct current-biased optical OFDMA (DCO-OFDMA) and asymmetrically clipped optical OFDMA (ACO-OFDMA) have been studied. However, DCO-OFDMA suffers from deteriorated bit error rate (BER), and ACO-OFDMA suffers from reduced spectral efficiency [9]. In comparison, SCMA can be combined with VLC to increase the spectral efficiency because of the following reasons [10]:

  • The dominant line-of-sight (LOS) component and the short distance between light-emitting diode (LED) and photodetector (PD) give rise to a high signal-to-noise ratio (SNR) at VLC receiver, which helps improve the performance of SCMA.

  • The limited modulation bandwidth of the LEDs can be efficiently utilized by SCMA to achieve high spectral efficiency.

Several research works incorporating SCMA in VLC (SCMA-VLC) systems have been presented in the literature. In [11], [12], experimental demonstration of SCMA-VLC system with overloading factor of 1.5 was reported 111The overloading factor of 1.5 means that the number of users is 1.5 times the number of resource elements.. In [13], a hybrid power-domain SCMA was investigated for VLC, showing improved data rate at the cost of reduced transmission distance. In [14], color-domain SCMA was proposed for VLC for a large throughput gain over conventional white light SCMA system. All the above works used the predefined RF complex SCMA CBs and made suitable changes (such as Hermitian symmetry and DC-level shifting) so that they can be applied to the VLC system. The authors in [15] focused on SCMA constellation design for VLC system in the presence of thermal noise with six users and eight resource elements (REs). In [16] and [17], SCMA CB has been designed for three users with four REs considering the impact of varying shot noise in VLC systems. Although [15, 16, 17] have proposed SCMA CBs for different VLC systems, however, there is still a lack of literature on designing SCMA CBs with overloading factor greater than one while considering the presence of shot noise in VLC systems.
Previously, the analytical expression of BER has been discussed [18, 19] either for power-domain NOMA techniques or for single-carrier scheme (such as on-off keying) for shot noise incorporated VLC systems. However, SCMA is a multi-carrier scheme, and its BER analysis will be different from single-carrier schemes. Further, when the SCMA-VLC system incorporates varying shot noise, the conventional closed-form BER expression does not follow the simulation results. Therefore, an exact theoretical BER expression for shot noise incorporated SCMA-VLC system has been proposed in this work. To the best of our knowledge, this paper is the first known work that proposes the SCMA CB design with 1.5 overloading factor for VLC systems considering shot noise. The contributions of this paper are summarized as follows:

  • A novel multidimensional, low-complex, and power-efficient SCMA CB designing technique has been proposed for shot noise incorporated VLC system utilizing the log-sum-exponential operation in the optimization objective function of CB design. The proposed CBs outperform CBs in the existing literature [16, 17] for different load factors with much less complexity.

  • The proposed optimization problem and its solution lead to flexible SCMA CBs which can meet the need of SCMA-VLC systems with varying loading factors.

  • The analytical expression of BER for SCMA-VLC system considering the shot noise has been derived. The simulation results show good agreement with the derived analytical BER expression, especially for higher signal power region.

The remainder of the paper is organized as follows. The SCMA-VLC system model is discussed in Section II. The proposed CB design and the theoretical BER expression for SCMA over shot noise VLC system are discussed in Section III. The results are presented and analyzed in Section IV. Section V concludes the paper.

Notations: Throughout this paper, x, x, X denote a scalar, vector and a matrix, respectively. Symbols xT\textbf{x}^{T} and XT\textbf{X}^{T} represent transpose of x and X, respectively. The i{i}th element of vector x is denoted by xi{x}_{i} and (X)ij(\textbf{X})_{ij} denotes the iith row and jjth column element of matrix X. Symbols 𝔹\mathbb{B} and >0\mathbb{R}_{>0} represents the set of binary numbers and, real and positive numbers, respectively. The diagonal matrix is denoted by diag(x) where the iith diagonal element is xi{x}_{i} and ‘log(x)’ denotes the natural logarithm of each element of x, respectively. The maximum value of f(x)f(x) as xx is varied over all its possible values is denoted by ‘maxxf(x)\max\limits_{x}f(x)’. The probability density function (PDF) of a Gaussian random variable (RV) with mean μ\mu and variance σ2\sigma^{2} is denoted by 𝒩[μ,σ2]\mathcal{N}[\mu,\sigma^{2}]. The trace of a square matrix A is denoted by Tr(A)\text{Tr}(\textbf{A}) which is calculated by the sum of main diagonal elements of A. The selection of rr elements from a set of nn elements is denoted by (nr)\binom{n}{r} and x\left\lVert\textbf{x}\right\rVert denotes the L2 norm of x, respectively.

II System Model

II-A Input-dependent Gaussian noise

Refer to caption
Figure 1: The system model diagram of 4×64\times 6 SCMA with the proposed CBs at the transmitter in VLC channel.

In the VLC system, the optical receiver (i.e., PD) measures the intensity of the incident optical signal and converts it into electrical signal. The interaction of the incoming photons with the matter of PD is a statistical process [20]. The fluctuations in the number of photons detected, results in fluctuating current which cause shot noise at the optical receiver. The generated shot noise depends on the incident optical signal itself [21, 22, 23]. Further, the thermal motion of the electronic carriers result in fluctuating voltage known as thermal noise. In case of strong ambient light, the impact of thermal noise is more and the shot noise becomes very low. Thus, the noises at the VLC system are assumed to be independent of the received signal [24, 25, 26]. However, in case of indoor scenario, the distance between transmitter and receiver is less and the dominant signal is LOS [27], thus the received power is large. However, in practical VLC systems, typical illumination and communication scenarios offer very high SNR[28, 29]. In case of indoor scenario (as considered in our work), since the received power is large, the shot noise is more dominant and cannot be neglected. The variance of shot noise is given as

σsh2=2qxpB+2qIBI2B,\displaystyle\sigma_{sh}^{2}=2qx_{p}\mathfrak{R}\text{B}+2qI_{B}I_{2}\text{B}, (1)

where qq is the electronic charge, xpx_{p} is the intensity of incident optical signal, \mathfrak{R} is responsivity, IBI_{B} is the background noise current, and I2I_{2} is the noise-bandwidth factor, and B is the effective bandwidth of the optical receiver.
The thermal noise is assumed to be Additive white Gaussian noise (AWGN), which is independent of the intensity of the incident signal [21]. The shot noise affected optical intensity channel can be distinguished as an input-dependent Gaussian noise (IDGN), where variance of IDGN can be used to characterise the physical properties of the VLC system [21, 30]. Consequently, the received signal yy can be expressed as

y=xp+xpZ1+Z0,y,xp0,\displaystyle y=x_{p}+\sqrt{x_{p}}Z_{1}+Z_{0},~{}~{}~{}~{}~{}~{}~{}y\in\mathbb{R},~{}x_{p}\geq 0, (2)

where Z1𝒩[0,ς2σ2]Z_{1}\sim\mathcal{N}_{\mathbb{R}}[0,\varsigma^{2}\sigma^{2}] denotes a real Gaussian RV with zero mean and ς2σ2\varsigma^{2}\sigma^{2} variance describing IDGN (shot noise), and Z0𝒩[0,σ2]Z_{0}\sim~{}\mathcal{N}_{\mathbb{R}}[0,\sigma^{2}] describes the thermal noise. Here, Z1Z_{1} and Z0Z_{0} are assumed to be independent, and ς2[1,10]\varsigma^{2}\in[1,10] denotes the strength of shot noise with respect to thermal noise. In an indoor scenario, as the transmitter and the receiver parameters change, the received power changes, and thus the shot noise varies. In this paper, the variation in shot noise has been depicted by considering different shot noise factor ς2\varsigma^{2} values.

II-B The SCMA-VLC Model

Consider a downlink indoor LOS VLC system where multiple users are being served, each equipped with a single receiving device. Every JJ users are grouped together for SCMA, and each group is supported by KK REs (e.g., time or frequency slots), providing the load factor λ=J/K\lambda=J/K. In Fig.1, the data transmission and reception of six users (J=6J=6) on four REs (K=4K=4) with λ=1.5\lambda=1.5 is shown.

At the transmitter, b=log2Mb=\text{log}_{2}M bits are mapped to KK-dimensional real and positive codewords, with MM number of codewords in a CB. These codewords are sparse vectors with NN non-zero elements, K>NK>N. Each user has a dedicated CB allotted to it. The CB of jjth user can be expressed as

𝔸j=VjCj,forj=1,,J,\displaystyle\mathbb{A}_{j}={\textbf{V}_{j}\textbf{C}_{j}},~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}\text{for}~{}j=1,\cdots,J, (3)

where Vj𝔹K×N\textbf{V}_{j}\in\mathbb{B}^{K\times N} and Cj>0N×M\textbf{C}_{j}\in\mathbb{R}_{>0}^{N\times M} denote the mapping matrix and constellation matrix of the jjth user, respectively. The constellation matrix Cj=[cj1,,cjM]\textbf{C}_{j}=[\textbf{c}_{j}^{1},\cdots,\textbf{c}_{j}^{M}], where cjm>0N×1\textbf{c}_{j}^{m}\in\mathbb{R}_{>0}^{N\times 1} denotes the mmth constellation point of Cj\textbf{C}_{j}. The whole CB structure of SCMA can be represented by the factor graph matrix, F=(f1,f2,,fJ)\textbf{F}=(\textbf{f}_{1},\textbf{f}_{2},\cdots,\textbf{f}_{J}), where fj=diag(VjVjT)\textbf{f}_{j}=\text{diag}(\textbf{V}_{j}\textbf{V}_{j}^{T}). The user jj is being served by resource node (RN) kk, if Fkj=1\textbf{F}_{kj}=1 (1kK,1jJ)(1\leq k\leq K,1\leq j\leq J). For a 4×64\times 6 SCMA block having K=4K=4 REs and J=6J=6 users, one example of the factor graph matrix of size 4×64\times 6 is given as

F4×6=[011010101001010101100110].\displaystyle\textbf{F}_{4\times 6}=\begin{bmatrix}0&1&1&0&1&0\\ 1&0&1&0&0&1\\ 0&1&0&1&0&1\\ 1&0&0&1&1&0\\ \end{bmatrix}. (4)
Refer to caption
Figure 2: Factor graph representation of 4×64\times 6 SCMA system with df=3d_{f}=3 and N=2N=2.

Fig. 2 shows an example of factor graph representation of six users (or Variable Nodes (VNs)) with four RNs, NN=2 and data of dfd_{f} users is being superimposed on each RN (df=3d_{f}=3 for F4×6\textbf{F}_{4\times 6} shown in (4)). The binary mapping matrices corresponding to the six users are given below

V1=[00100001],V2=[10000100],V3=[10010000],V4=[00001001],V5=[10000001],V6=[00100100].\begin{split}\textbf{V}_{1}=\begin{bmatrix}0&0\\ 1&0\\ 0&0\\ 0&1\\ \end{bmatrix},\textbf{V}_{2}=\begin{bmatrix}1&0\\ 0&0\\ 0&1\\ 0&0\\ \end{bmatrix},\textbf{V}_{3}=\begin{bmatrix}1&0\\ 0&1\\ 0&0\\ 0&0\\ \end{bmatrix},\\ \\ \textbf{V}_{4}=\begin{bmatrix}0&0\\ 0&0\\ 1&0\\ 0&1\\ \end{bmatrix},\textbf{V}_{5}=\begin{bmatrix}1&0\\ 0&0\\ 0&0\\ 0&1\\ \end{bmatrix},\textbf{V}_{6}=\begin{bmatrix}0&0\\ 1&0\\ 0&1\\ 0&0\\ \end{bmatrix}.\end{split} (5)

The set of CBs for JJ users is dependent on the constellation matrices 𝐂j,j=1,,J\mathbf{C}_{j},~{}j=1,\cdots,J as the mapping matrices remain fixed as shown in (5). Assuming synchronous multiplexing between users, the received signal can be expressed as

y=j=1Jdiag(hj)xj+diag(j=1Jdiag(hj)xj)12nsh+nth,=j=1Jdiag(hj)Vjcj+diag(j=1Jdiag(hj)Vjcj)12nsh+nth,\begin{split}&\textbf{y}=\sum_{j=1}^{J}\text{diag}(\textbf{h}_{j})\textbf{x}_{j}+\text{diag}\left(\sum_{j=1}^{J}\text{diag}(\textbf{h}_{j})\textbf{x}_{j}\right)^{\frac{1}{2}}\textbf{n}_{sh}+\textbf{n}_{th},\\ &=\sum_{j=1}^{J}\text{diag}(\textbf{h}_{j})\textbf{V}_{j}\textbf{c}_{j}+\text{diag}\left(\sum_{j=1}^{J}\text{diag}(\textbf{h}_{j})\textbf{V}_{j}\textbf{c}_{j}\right)^{\frac{1}{2}}\textbf{n}_{sh}+\\ &\textbf{n}_{th},\end{split} (6)

where xj>0K×1\textbf{x}_{j}\in\mathbb{R}_{>0}^{K\times 1} is a codeword of jjth user, diag(hj)\text{diag}(\textbf{h}_{j}) denotes the channel matrix of jjth user, the second term represents the IDGN with nsh𝒩[0,ς2σ2I]\textbf{n}_{sh}\sim\mathcal{N}_{\mathbb{R}}[\textbf{0},\varsigma^{2}\sigma^{2}\textbf{I}], and nth𝒩[0,σ2I]\textbf{n}_{th}\sim\mathcal{N}_{\mathbb{R}}[\textbf{0},\sigma^{2}\textbf{I}]. The channels are assumed to be unit vectors for simplicity, and the extension to the general VLC values is straight-forward. In case of the movement of the users, the channel characteristics of the users ((hj)((\textbf{h}_{j}) of jjth user in (6))(\ref{rec_sig_eqn})) will be affected. The random waypoint (RWP) mobility model is a simple and straightforward stochastic model that describes a human movement behavior in indoor scenarios [31]. In case of user mobility, the received signal expression remains same as (6), however the channel vector (h) varies as per the RWP model in (6).

II-C SCMA-VLC Decoding

Assuming perfect channel estimation and the set of CBs known to receiver, the SCMA multi-user codeword X=[x1,x2,,xJ]\textbf{X}=[\textbf{x}_{1},\textbf{x}_{2},\cdots,\textbf{x}_{J}] can be detected by solving the joint maximum a-posteriori (MAP) probability mass function (PMF) of the transmitted codewords [7], [32]. The estimated X can be written as

X^=argmaxxj𝔸j,jp(X|y),\displaystyle\hat{\textbf{X}}=\operatorname*{argmax}_{\textbf{x}_{j}\in\mathbb{A}_{j},\forall j}p(\textbf{X}|\textbf{y})\,, (7)

where 𝔸j\mathbb{A}_{j} represents the set of codewords allotted to the jjth user. The marginal distribution of (7) with respect to xj\textbf{x}_{j} (i.e., summing the joint PMF of multi-user codeword over all values of X except xj\textbf{x}_{j}) leads to jjth user detected symbol as

x^j=argmaxxj𝔸jxjp(X|y).\displaystyle\hat{\textbf{x}}_{j}=\operatorname*{argmax}_{\textbf{x}_{j}\in\mathbb{A}_{j}}\sum_{{\sim}\textbf{x}_{j}}p(\textbf{X}|\textbf{y})\,. (8)

Using Bayes’ rule

x^j=argmaxxj𝔸jxjf(y|X)P(X),\displaystyle\hat{\textbf{x}}_{j}=\operatorname*{argmax}_{\textbf{x}_{j}\in\mathbb{A}_{j}}\sum_{{\sim}\textbf{x}_{j}}f(\textbf{y}|\textbf{X})P(\textbf{X})\,, (9)

where P(X)P(\textbf{X}) denotes the joint a-priori PMF of all transmitted codewords and f(y|X)f(\textbf{y}|\textbf{X}) denotes the conditional pdf of the received vector. Assuming noise components are independent and identically distributed for all REs. Then (9) becomes

x^j=argmaxxj𝔸jxj(P(X)k=1Kf(yk|X)),\displaystyle\hat{\textbf{x}}_{j}=\operatorname*{argmax}_{\textbf{x}_{j}\in\mathbb{A}_{j}}\sum_{{\sim}\textbf{x}_{j}}\left(P(\textbf{X})\prod_{k=1}^{K}f(y_{k}|\textbf{X})\right)\,,\enspace
forj=1,,J,\displaystyle\text{for}~{}j=1,\cdots,J, (10)

where yky_{k} denotes the received signal at the kkth RE. Solving the above marginal product of function (MPF) problem with brute force will lead to exponential complexity. Taking advantage of sparse CBs, this problem can be approximately solved by iterative MPA with moderate complexity [7], [33]. MPA works as a decoding algorithm based on passing the extrinsic information between RNs and VNs. The first message is passed from the leaf node (node which has only one neighboring node), and a node of degree dd will remain idle until it has received messages from the d1d-1 number of neighboring nodes. MPA involves a large number of exponential operations which are of high complexity. A mathematical simplification is to move MPA to logarithm domain and use Jacobian logarithm, which gives a simpler version called Max-Log-MPA [34]. With Jacobian logarithm, the log-sum of exponentials can be approximated as a maximum operation as shown below:

log(exp(a1)++exp(aJ))max(a1,,aJ).\displaystyle\log(\exp(a_{1})+\cdots+\exp(a_{J}))\approx\text{max}(a_{1},\cdots,a_{J}). (11)

The Max-Log-MPA for detection of SCMA codewords in VLC is based on three steps as shown in Algorithm 1. Let ζj\zeta_{j} and ξk\xi_{k}, be the set of nodes connected to VN jj and RN kk, respectively. Let ηkj\eta_{k\rightarrow j} and ηjk\eta_{j\rightarrow k} be the message passed from RN kk to VN jj and vice-versa. Also, rξk{j}r\in\xi_{k}\setminus\{j\} denotes all the VNs of ξk\xi_{k} except VN jj and dζj{k}d\in\zeta_{j}\setminus\{k\} denotes the RNs in ζj\zeta_{j} except the kkth RN.

In Algorithm 1, it is assumed that the received signal y and all the CBs Cj, j=1,,J\forall j=1,\cdots,J are known at the receiver. The total number of iterations considered in Step 2 are NtN_{t} and, VNs and RNs are updated for each iteration tt. Also, the channel coefficient between kkth RN and mmth VN is denoted by hkmh_{km} and the codeword element transmitted by mmth VN on kkth RN is denoted by xkmx_{km}, respectively.

Input: y, Cj, j=1,,J\forall j=1,\cdots,J.
Output: Estimated value of bits for jjth user, j=1,,J.\forall j=1,\cdots,J.
1:  Step 1: Initialization
The prior probability of each codeword: ηjk0=log1M.\eta_{j\rightarrow k}^{0}=\text{log}\frac{1}{M}.
2:  Step 2: Message passing along the nodes
for t=1toNtt=1~{}\textnormal{{to}}~{}N_{t} do
      a) Update RN:
ηkjt(xj)=\displaystyle\eta_{k\rightarrow j}^{t}(\textbf{x}_{j})=
maxxj(12ρ2ykmξkhkmxkm2+rξk{j}ηrkt1(xr)),\displaystyle\max_{{\sim}\textbf{x}_{j}}\Bigg{(}\frac{-1}{2\rho^{2}}\left\lVert y_{k}-\sum_{m\in\xi_{k}}h_{km}x_{km}\right\rVert^{2}+\sum_{r\in\xi_{k}\setminus\{j\}}\eta_{r\rightarrow k}^{t-1}(\textbf{x}_{r})\Bigg{)},
where, ρ2=σ2+ς2σ2mξkhkmxkm.\rho^{2}=\sigma^{2}+\varsigma^{2}\sigma^{2}\sum_{m\in\xi_{k}}h_{km}x_{km}.
      b) Update VN:
ηjk(xj)=log(1M)+dζj{k}ηdjt1(xj).\displaystyle\eta_{j\rightarrow k}(\textbf{x}_{j})=\text{log}\left(\frac{1}{M}\right)+\sum_{d\in\zeta_{j}\setminus\{k\}}\eta_{d\rightarrow j}^{t-1}(\textbf{x}_{j}).
      end
3:  Step 3: Bit log-likelihood ratio (LLR)
The final belief computed at each VN is:
logIj(xj)=log(1M)+kζjηkj(xj)\displaystyle\text{log}~{}\textbf{I}_{j}(\textbf{x}_{j})=\text{log}\left(\frac{1}{M}\right)+\sum_{k\in\zeta_{j}}\eta_{k\rightarrow j}(\textbf{x}_{j})
The κ\kappath bit LLR at jjth VN is
LLRκj=\displaystyle LLR_{\kappa}^{j}=
max{xj𝔸j|κ=0}(log(Ij(xj)))max{xj𝔸j|κ=1}(log(Ij(xj))).\displaystyle\max_{\{\textbf{x}_{j}\in\mathbb{A}_{j}|\kappa=0\}}(\text{log}{(\textbf{I}_{j}(\textbf{x}_{j})}))-\max_{\{\textbf{x}_{j}\in\mathbb{A}_{j}|\kappa=1\}}(\text{log}{(\textbf{I}_{j}(\textbf{x}_{j})})).
where, κ^j=0\hat{\kappa}_{j}=0 if LLRκjLLR_{\kappa}^{j} is positive otherwise κ^j=1\hat{\kappa}_{j}=1.
Algorithm 1 Max-Log-MPA

In the case of shot noise, the variance at each RN is different and dependent on the superimposed codeword element at the corresponding RN, while in the presence of only thermal noise, ς2=0\varsigma^{2}=0, so ρ2=σ2\rho^{2}=\sigma^{2} and variance will be the same for all RNs. In case of three users scenario, the factor graph would not be cyclic and number of elements being superimposed on each RN would be different (df=2d_{f}=2 for k=1,2k=1,2 and df=1d_{f}=1 for k=3,4k=3,4). Since dfd_{f} is different for different REs, therefore, Algorithm 1 will change accordingly [35].

The computational complexity of standard MPA and Max-Log-MPA considering the effect of shot noise in decoding is shown in Table I [36]. The number of operations is shown for the update step of RN as shown in Step 2 (a) of Algorithm 1. Max-Log-MPA requires more addition operations and less multiplication operations than MPA. This gap of increase in addition and decrease in multiplication operations between MPA and Max-Log-MPA increases with the overloading factor.

TABLE I: Complexity analysis of MPA and Max-Log-MPA considering shot noise.
Operations MPA Max-Log-MPA
Exponential MdfKdfNitM^{d_{f}}Kd_{f}N_{it} 0
Multiplication (df+3)MdfKdfNit(d_{f}+3)M^{d_{f}}Kd_{f}N_{it} 4MdfKdfNit4M^{d_{f}}K{d_{f}}N_{it}
Addition (2df+2)MdfKdfNit(2{d_{f}}+2)M^{d_{f}}K{d_{f}}N_{it} (3df+1)MdfKdf2Nit(3d_{f}+1)M^{d_{f}}K{{d_{f}}^{2}}N_{it}
Comparison 0 MdfKdfNitM^{d_{f}}K{{d_{f}}}N_{it}

III CB Design and Optimization

For SCMA CB design and optimization, most researchers aim for maximization of the minimum Euclidean distance (MED) between the superimposed codewords [37, 38, 39]. In this section, a method of designing constellation matrices C=[C1,,CJ]>0N×MJ\textbf{C}=[\textbf{C}_{1},\cdots,\textbf{C}_{J}]\in\mathbb{R}_{>0}^{N\times MJ} is introduced and discussed as an optimization problem.

III-A The Problem Formulation

In the AWGN channel, MED is taken as one of the key performance indicators for determining the performance of the designed SCMA CB. Let si\textbf{s}_{i} be a superimposed codeword from the combined constellation matrix 𝕄v>0K×MJ\mathbb{M}_{v}\in\mathbb{R}_{>0}^{K\times M^{J}}. Then, the MED between si𝕄v\textbf{s}_{i}\in\mathbb{M}_{v} and sj𝕄v\textbf{s}_{j}\in\mathbb{M}_{v} is given as

dij=(sisj)T(sisj),i<j[1,MJ].\displaystyle d^{\prime}_{ij}=(\textbf{s}_{i}-\textbf{s}_{j})^{T}(\textbf{s}_{i}-\textbf{s}_{j}),~{}~{}~{}~{}~{}~{}~{}~{}~{}\forall~{}i<j\in[1,M^{J}]. (12)

The MED emerge as a critical parameter because of the pair-wise error probability (PEP) for AWGN channel which is given as

P(sisj)=Q(sisj22σ2).\displaystyle P^{\prime}(\textbf{s}_{i}\rightarrow\textbf{s}_{j})=Q\left(\sqrt{\frac{\left\lVert\textbf{s}_{i}-\textbf{s}_{j}\right\rVert^{2}}{2\sigma^{2}}}\right). (13)

However, in case of IDGN, the PDF of the received signal y is given as (assuming unit channel gain)

f(y|si)=1(2π)K/21|Σi|12exp{12(ysi)TΣi1(ysi)},\displaystyle f(\textbf{y}|\textbf{s}_{i})=\frac{1}{(2\pi)^{K/2}}\frac{1}{|{\Sigma_{i}}|^{\frac{1}{2}}}\text{exp}\{-\frac{1}{2}(\textbf{y}-\textbf{s}_{i})^{T}\Sigma_{i}^{-1}(\textbf{y}-\textbf{s}_{i})\}, (14)

where Σi=diag{ς2σ2si+σ21}\Sigma_{i}=\text{diag}\{\varsigma^{2}\sigma^{2}\textbf{s}_{i}+\sigma^{2}\textbf{1}\} denotes the covariance matrix for the si\textbf{s}_{i}th superimposed codeword. It can be seen from (14) that the variance is now dependent on the superimposed codeword.

In the case of only thermal noise, MED is taken as a critical parameter for designing CB where variance is independent of the superimposed codeword. However, in the case of shot noise, when variance is no longer independent, the conventional MED cannot serve as an optimal performance indicator. With the effect of shot noise, the shape of constellation points gets distorted. To mitigate the effect of IDGN, the authors in [16] introduced an improved optimization objective based on Rotated-MED for designing constellation matrices. The rotated Euclidean distance (RED) between superimposed codewords si\textbf{s}_{i} and sj\textbf{s}_{j} can be expressed as

dij=(sisj)TGi12Gj12(sisj),i<j[1,MJ],d_{ij}=(\textbf{s}_{i}-\textbf{s}_{j})^{T}{\textbf{G}_{i}}^{-\frac{1}{2}}{\textbf{G}_{j}}^{-\frac{1}{2}}(\textbf{s}_{i}-\textbf{s}_{j}),\\ ~{}~{}\forall~{}i<j\in[1,M^{J}], (15)

where Gi=ς2diag{si}+I\textbf{G}_{i}=\varsigma^{2}\text{diag}\{\textbf{s}_{i}\}+\textbf{I}, Gj=ς2diag{sj}+I\textbf{G}_{j}=\varsigma^{2}\text{diag}\{\textbf{s}_{j}\}+\textbf{I} and I𝔹K×K\textbf{I}\in\mathbb{B}^{K\times K} represents the Identity matrix. It is to be noted from (15) that the new parameter RED incorporates the shot noise effect while computing the Euclidean distance between superimposed codewords. The authors in [16] aimed at maximizing the rotated minimum Euclidean distance (R-MED) subject to the power constraints. The objective function proposed in [16] for SCMA CB design is given as

maxL>0NMJ×1{min1ijMJdij(L)},\displaystyle\max_{\textbf{L}\in\mathbb{R}_{>0}^{NMJ\times 1}}\left\{\min_{1\leq i\leq j\leq M^{J}}d_{ij}(\textbf{L})\right\}, (16)

where L=vec(C)\textbf{L}=\text{vec}(\textbf{C}). This was further simplified as

maxL>0NMJ×1,dmin > 0dmin,\displaystyle\max_{\textbf{L}\in\mathbb{R}_{>0}^{NMJ\times 1},~{}d_{\text{min $>$ 0}}}d_{\text{min}}, (17)

where dmind_{\text{min}} denotes the minimum value of RED. It has been verified in [16] that R-MED based CB outperforms the MED based CB for VLC systems affected by shot noise. The results in [16] have shown that for J=3,K=4,M=4,ς2=5J=3,K=4,M=4,\varsigma^{2}=5 and σ2=0.01\sigma^{2}=0.01, BER of 10310^{-3} is achieved at Pe=10P_{e}=10 and Pe=7P_{e}=7 for MED and R-MED based CBs, where PeP_{e} denotes the maximum electrical power allotted to a user. Since from the literature we can understand that RED works as an important parameter for designing CB than MED, we have included RED in our optimization problem. Further, the authors in [17] introduced the concept of distance range (DR) based on the maximum and the minimum values of the RED. They have mentioned that for the low to medium SNR region, the BER is no longer dependent on just R-MED. The optimization problem proposed in [17] for CB designing is

maxdmin>0,dmax>0{dminαdmax}\displaystyle\max_{d_{\text{min}}>0,d_{\text{max}}>0}\left\{d_{\text{min}}-\alpha d_{\text{max}}\right\} (18a)
s.t.Li>0,i[1,NMJ],\displaystyle~{}~{}~{}~{}\textrm{s.t.}~{}~{}~{}~{}L_{i}>0,~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}\forall~{}i\in[1,NMJ], (18b)
1MTr(CjTCj)Pe,j[1,J],\displaystyle\frac{1}{M}\text{Tr}(\textbf{C}_{j}^{T}\textbf{C}_{j})\leq P_{e},~{}~{}~{}~{}\forall~{}j\in[1,J], (18c)
dijdmin,i<j,\displaystyle d_{ij}\geq d_{\text{min}},~{}~{}~{}~{}\forall~{}i<j, (18d)
dijdmax,i<j,\displaystyle d_{ij}\leq d_{\text{max}},~{}~{}~{}~{}\forall~{}i<j, (18e)

where dmaxd_{\text{max}} denotes the maximum value of RED, and α>0\alpha>0 denotes the weighting factor. The objective function shown in (18a) is dependent on dmind_{\text{min}} and dmaxd_{\text{max}}. The real and positive optical signal constraint is considered in (18b) and maximum electrical power constraint is considered in (18c). All the REDs will lie between dmind_{\text{min}} and dmaxd_{\text{max}} (18d, 18e). Also, it is to be noted that, lesser the overlapping between the constellation points of a user, better the performance of the designed CBs.

III-B The Objective Function

The objective function mentioned in (16) considers all the REDs while designing and optimizing the CBs to get optimum results. However, considering all the REDs makes the objective function non-convex and non-differentiable [40]. To solve (16), authors in [17] have proposed the objective function as shown in (III-A). It should be noted that the numerical methods used for solving the nonlinear maxi-min problem aim at approximating the F(x)=minifi(x)F(x)=\min_{i}f_{i}(x) by close enough smooth functions, and the closeness of approximation decide the nearness to optimal solutions [41]. If we consider iϕ(fi(x))\sum_{i}\phi(f_{i}(x)), the approximation to F(x)F(x) becomes better when ϕ(.)\phi(.) is a strong convex function (i.e., large positive second derivative). One approach to solve this non-convex problem is to use well known “log sum-exponentials” continuous approximation [42], [43]. With this approximation, the objective function in (16) transforms to

minL>0NMJ×11βln{ijeβdij(L)},\displaystyle\min_{\textbf{L}\in\mathbb{R}_{>0}^{NMJ\times 1}}\frac{1}{\beta}\text{ln}\left\{\sum_{i\neq j}e^{-\beta~{}d_{ij}(\textbf{L})}\right\}, (19)

where β>0\beta>0 is a tuning parameter which results in the smoothness of (19) and affects the accuracy of the model.

  • Example 1: Let β=1\beta=1, and there are two distances d1d2d_{1}\gg d_{2}, then
    ln(ed1+ed2)ln(ed2)=d2=min{d1,d2}.-\text{ln}(e^{-d_{1}}+e^{-d_{2}})\\ \approx-\text{ln}(e^{-d_{2}})=d_{2}=\min\{d_{1},d_{2}\}.

The function in (19) is differentiable but still non-convex; however, optimization algorithms based on the derivation of the Hessian of the objective function can find the local optimal solution [44]. Also, if the objective function is optimized number of times with initialization from small set of random numbers and choosing the β\beta parameter wisely, the likelihood of obtaining the global optimal solution increases [45]. Thus, the optimization problem is formulated as

minL>0NMJ×11βln{ijeβdij(L)}\displaystyle\min_{\textbf{L}\in\mathbb{R}_{>0}^{NMJ\times 1}}\quad\frac{1}{\beta}\text{ln}\left\{\sum_{i\neq j}e^{-\beta~{}d_{ij}(\textbf{L})}\right\} (20a)
s.t.Li>0,i[1,NMJ],\displaystyle~{}~{}~{}~{}\textrm{s.t.}~{}~{}~{}~{}L_{i}>0,~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}\forall~{}i\in[1,NMJ], (20b)
1MTr(CjTCj)Pe,j[1,J],\displaystyle\frac{1}{M}\text{Tr}(\textbf{C}_{j}^{T}\textbf{C}_{j})\leq P_{e},~{}~{}~{}~{}\forall~{}j\in[1,J], (20c)

where (20b) denotes the real positive intensity constraint of the transmitted codeword elements and (20c) denotes that the average electrical power of the generated codewords should be less than the maximum electrical power (PeP_{e}) allotted per user. The optimization problem in (20) can be solved using commercially available solvers like MATLAB’s fminconfmincon. The procedure for solving the above optimization problem is summarized in Algorithm 2.

Step 1: Initialization:
Randomly initialize L=L0\textbf{L}=\textbf{L}^{0} satisfying the intensity and power constraints, β=1\beta=1.
Step 2: Optimization
1:  for β30\beta\leq 30 do
2:     (a) Solve the optimization problem [fvt,𝐋t]min1βln{ijeβdij(L)}[f_{v}^{t^{\prime}},\mathbf{L}^{t^{\prime}}]\leftarrow\min\mkern 15.0mu\frac{1}{\beta}\text{ln}\left\{\sum_{i\neq j}e^{-\beta~{}d_{ij}(\textbf{L})}\right\}
                  subject to Constraints.
where fvtf_{v}^{t^{\prime}} denotes the value of the objective function at the obtained solution L at tt^{\prime}th iteration.
3:     (b)
4:     if  |fvtfvt1|103;|{{f_{v}}^{t^{\prime}}-{f_{v}}^{{t^{\prime}}-1}}|\geq 10^{-3}; then
5:        t’=t’+1, go to Step 2 (a);
6:     else
7:        exit
8:     end if
9:  end for
Output: 𝐋t\mathbf{L}^{t^{\prime}} as the SCMA output constellation stacked vector.
Algorithm 2 SCMA CB Optimization Algorithm

III-C Complexity Analysis

For the case of the proposed optimization problem in (20), initially, the set of all multiplexed vectors (or superimposed codewords) 𝕄v\mathbb{M}_{v} is computed. With JJ users and MM number of codewords in the CB, the number of superimposed codewords obtained are MJM^{J}, i.e., |𝕄v|=MJ|\mathbb{M}_{v}|=M^{J}. Since the complexity of operations such as addition and subtraction is O(1)O(1) therefore, the complexity of computing multiplexed vectors is O(JMJ)O(JM^{J}). Next, for generating the covariance matrix (Σi\Sigma_{i} for si\textbf{s}_{i} superimposed codeword), each multiplexed vector is multiplied with the scalar ς2\varsigma^{2} which results in the complexity O(KMJ)O(KM^{J}). The complexity of computing RED (as shown in (15)) between two multiplexed vectors is O(K)O(K) as the length of each vector is KK and the total number of multiplexed vectors are MJM^{J}. Thus, the total number of REDs between MJM^{J} multiplexed vectors is (MJ2)\binom{M^{J}}{2} and the total complexity for calculating REDs will be O(K(MJ2))O(K~{}{\binom{M^{J}}{2}}). Next, the complexity of computing the objective function (20a) is (MJ2)\binom{M^{J}}{2}. The complexity of constraints in (20b) and (20c) is O(1)O(1) since it includes addition and square operations. The maximum value of β\beta at which the algorithm converges is denoted by βmax\beta_{max} and number of iterations for the MATLAB’s fminconfmincon solver is NitN_{it}, then total complexity to generate the constellation matrices for JJ users using Algorithm 2 is OLogsum=[βmaxNit(JMJ+KMJ+K(MJ2)+(MJ2)+1)]O_{Logsum}=[\beta_{max}N_{it}(JM^{J}+KM^{J}+{K~{}{\binom{M^{J}}{2}}}+{\binom{M^{J}}{2}}+1)]. If we take the most dominant part resulting for complexity, it is equal to O(βmaxNitK(MJ2))O(\beta_{max}N_{it}K~{}{\binom{M^{J}}{2}}).

In case of the DR based CB [17] optimization problem (as shown in (III-A)), the total complexity comes from the computation of the objective function and four constraints. The third and fourth distance based constraints (18d, 18e) are non-convex and are approximated using first order Taylor series [16]. From the calculation of multiplexed vectors, covariance matrices and REDs, the complexity is O(JMJ+KMJ+K(MJ2))O(JM^{J}+KM^{J}+{K~{}{\binom{M^{J}}{2}}}). The complexity of intensity and power constraints (18b, 18c) is O(1)O(1). For the approximation of two non-convex constraints (18d, 18e), firstly the coefficient matrix Πi\Pi_{i} is calculated to obtain multiplexed vector si\textbf{s}_{i} from L [16], and its complexity is MJKNMJM^{J}KNMJ. Next, we found that the derivative of RED has the highest complexity because of the kronecker product operation involved. The derivative term has the complexity O((KNMJ)2(MJ2))O({(KNMJ)^{2}~{}{\binom{M^{J}}{2}}}). So, with NoutN_{out} as total number of outer loop iterations, the total complexity is ODR=[O(NoutNit(JMJ+KMJ+K(MJ2)+(MJ2)+1+MJKNMJ+(KNMJ)2(MJ2)))]O_{DR}=[O(N_{out}N_{it}(JM^{J}+KM^{J}+{K~{}{\binom{M^{J}}{2}}}+{\binom{M^{J}}{2}}+1+M^{J}KNMJ+{(KNMJ)^{2}~{}{\binom{M^{J}}{2}}}))]. Taking only the dominant part, the complexity becomes O(NoutNit(KNMJ)2(MJ2))O(N_{out}N_{it}{(KNMJ)^{2}~{}{\binom{M^{J}}{2}}}). It can be observed that the proposed Log-sum-exp scheme (20) has reduced the computation complexity of SCMA CB design by a significant amount from DR based CB optimization problem shown in (III-A).

III-D Theoretical BER

SCMA is a multi-carrier scheme, i.e., the superimposed transmitted codeword si=[si1,,siK]\textbf{s}_{i}=[s_{i}^{1},\cdots,s_{i}^{K}] is a KK dimensional real codeword as discussed in Section II-B. In this section, the theoretical BER expression has been derived for the IDGN incorporated SCMA-VLC system. For only the thermal noise case, the PEP is given as (13). However, in the case of shot noise, the overall variance changes and is dependent on ς2\varsigma^{2} and the intensity of the incident optical signal. The error rate for the superimposed codeword si\textbf{s}_{i} is

P(si)=i=1iiMJ1P(sisi)\displaystyle P^{\prime}(\textbf{s}_{i})=\sum\limits_{\begin{subarray}{c}i^{\prime}=1\\ i^{\prime}\neq i\end{subarray}}^{M^{J}-1}P^{\prime}(\textbf{s}_{i}\rightarrow\textbf{s}_{i^{\prime}})~{}~{} (21)
=i=1iiMJ1Q(k=1Ksiksik22νi,k),\displaystyle=\sum\limits_{\begin{subarray}{c}i^{\prime}=1\\ i^{\prime}\neq i\end{subarray}}^{M^{J}-1}Q\left(\sqrt{\sum_{k=1}^{K}\frac{\left\lVert{s}_{i}^{k}-{s}_{i^{\prime}}^{k}\right\rVert^{2}}{2\nu_{i,k}}}\right), (22)

where sik{s}_{i}^{k} and sik{s}_{i^{\prime}}^{k}, denotes the kkth element of the superimposed codeword si\textbf{s}_{i} and si\textbf{s}_{i^{\prime}}, respectively. The kkth diagonal element of the covariance matrix Σi\Sigma_{i} of the superimposed codeword si\textbf{s}_{i} is denoted by νi,k\nu_{i,k}. The diagonal element νi,k\nu_{i,k} denotes the total variance at kkth RE when si\textbf{s}_{i} was transmitted. The total probability of error is given as [46]

Perr=1Jlog2Mi=1MJPa(si)i=1iiMJ1hd(si,si)P(sisi),\displaystyle P_{err}=\frac{1}{J\text{log}_{2}{M}}\sum_{i=1}^{M^{J}}P_{a}(\textbf{s}_{i})\sum\limits_{\begin{subarray}{c}i^{\prime}=1\\ i^{\prime}\neq i\end{subarray}}^{M^{J}-1}h_{d}(\textbf{s}_{i^{\prime}},\textbf{s}_{i})P^{\prime}(\textbf{s}_{i}\rightarrow\textbf{s}_{i^{\prime}}), (23)

where Pa(si)P_{a}(\textbf{s}_{i}) denotes the a priori probability of si\textbf{s}_{i}, hd(si,si)h_{d}(\textbf{s}_{i^{\prime}},\textbf{s}_{i}) denotes the bit error when si\textbf{s}_{i^{\prime}} is chosen over si\textbf{s}_{i} and P(sisi)P^{\prime}(\textbf{s}_{i}\rightarrow\textbf{s}_{i^{\prime}}) denotes the PEP between si\textbf{s}_{i} and si\textbf{s}_{i^{\prime}}.

Refer to caption
Figure 3: BER performance comparison for J=6J=6 between Star QAM based CB [37], Huawei CB [47] and Log-sum-exp CBs for K=8,σ2=0.01,M=4K=8,\sigma^{2}=0.01,M=4.
Refer to caption
(a) User 1
Refer to caption
(b) User 2
Refer to caption
(c) User 3
Refer to caption
(d) User 1
Refer to caption
(e) User 2
Refer to caption
(f) User 3
Figure 4: SCMA constellations scatter plots with J=3,K=4,Pe=30,ς2=10J=3,K=4,P_{e}=30,\varsigma^{2}=10 (a)-(c): DR based constellation sets, (d)-(f): Log-sum-exp based constellation sets.
Refer to caption
Figure 5: BER performance comparison for J=3J=3 between DR based CBs and Log-sum-exp CBs for σ2=0.01,M=4\sigma^{2}=0.01,M=4.

IV Results and Discussion

In this section, the simulation and theoretical results of the BER performance of the proposed SCMA CB are presented. Firstly, using Algorithm 2, we can generate the proposed CBs for different users. Further, Max-Log-MPA (as shown in Algorithm 1) has been used for multi-user detection.

IV-A RF based CBs Performance in VLC system

We consider the case where RF-based CBs are used for transmitting data over a VLC system. We consider the 4×64\times 6 SCMA CBs from [37] and [47]. RF CBs cannot be employed as it is, as the VLC system has the requirement of real and positive signal transmission. So, the complex codeword elements are divided into real and imaginary parts, which are then DC biased to get real and positive codeword elements [37], [47]. These real and positive codewords are transmitted over different REs . This way, the data of six users is transmitted over eight REs. Further, we have generated the Log-sum-exp based CB for six users and eight REs scenario using Algorithm 2. Fig. 3 shows the bit error rate (BER) performance of the Star QAM based CB [37], Huawei CB [47] and Log-sum-exp CBs for K=8K=8 and σ2=0.01\sigma^{2}=0.01. It can be understood from Fig. 3 that CBs designed solely for the VLC system (proposed Log-sum-exp based CB) outperforms the RF-based CBs for shot noise incorporated VLC system. The performance gap observed in Fig. 3 motivated the authors to design CB especially for the SCMA-VLC system.

IV-B The case of three users

For the initial simulation, we consider the case where three users share four REs with M=4M=4 and the number of non-zero elements in the codeword is N=2N=2. The mapping matrices V1,V2,V3\textbf{V}_{1},\textbf{V}_{2},\textbf{V}_{3} have the same values as shown in (5) (i.e., df=2d_{f}=2 for k=1,2k=1,2 and df=1d_{f}=1 for k=3,4k=3,4). For three users, the CBs (DR based and Log-sum-exp based) are generated by solving the optimization problems (III-A, 20) (CBs are shown in Appendix). For J=3J=3, Algorithm 2 is found to be converging for low values of β\beta (i.e., β=10\beta=10). Fig. 4. shows the 2-dimensional (2D) scatter plots of the generated DR based CBs (III-A) and the proposed Log-sum-exp based CBs (20) for ς2=10\varsigma^{2}=10 and Pe=30P_{e}=30. It can be noted that the constellation points under DR criterion (III-A) are substantially overlapping as shown in Fig. 4(a)-4(c). However, the overlapping between proposed Log-sum-exp based constellation points for all three users is negligible as shown in Fig. 4(d)-4(f). As the overlapping increases between different constellation points, it becomes difficult for the receiver to detect the symbols correctly, and thus, the overall performance deteriorates.

Refer to caption
(a) User 1
Refer to caption
(b) User 2
Refer to caption
(c) User 3
Refer to caption
(d) User 1
Refer to caption
(e) User 2
Refer to caption
(f) User 3
Figure 6: Lines of equal probability density functions of 2D SCMA constellations points with 95% confidence interval for J=3,K=4,Pe=30,ς2=10J=3,K=4,P_{e}=30,\varsigma^{2}=10 (a)-(c): DR based EPDLs, (d)-(f): Log-sum-exp based EPDLs.
Refer to caption
Figure 7: BER performance comparison for J=4J=4 between SCMA DR based CBs, Log-sum-exp CBs and OMA scheme for σ2=0.01,M=4\sigma^{2}=0.01,M=4.
Refer to caption
(a) User 1
Refer to caption
(b) User 2
Refer to caption
(c) User 3
Refer to caption
(d) User 4
Refer to caption
(e) User 1
Refer to caption
(f) User 2
Refer to caption
(g) User 3
Refer to caption
(h) User 4
Figure 8: SCMA constellations with J=4,K=4,Pe=30,ς2=10J=4,K=4,P_{e}=30,\varsigma^{2}=10 (a)-(d): DR based constellation sets, (e)-(f): Log-sum-exp based constellation sets.

Fig. 5 shows the bit error rate (BER) performance for three users of the proposed Log-sum-exp based (20) SCMA CBs and the DR based CBs (III-A), respectively. The negligible overlapping in the case of log-sum-exp CBs as compared to DR CBs (in Fig. 4), reasons the performance gain obtained in Fig. 5. For both CBs (DR based and Log-sum-exp based), Max-Log-MPA (Algorithm 1) has been used for multi-user detection. It can be noticed that for the low value of ς2\varsigma^{2} (e.g., ς2=2\varsigma^{2}=2), BER performance of both CBs is close, and for high values of ς2\varsigma^{2} (e.g., ς2=5,10\varsigma^{2}=5,10), the proposed Log-sum-exp based CBs yield better performance gain as compared to DR based CBs. This suggests that the objective function with all the REDs results in better CB (i.e., Log-sum-exp based CB) than the CB with only minimum and maximum values of REDs (i.e., DR based CB). It is shown that our proposed CBs achieve the BER of 10310^{-3} at Pe=15P_{e}=15 while DR based CB achieve it at Pe20P_{e}\approx 20 for ς2=10\varsigma^{2}=10. This suggests that for large values of ς2\varsigma^{2}, the advantage of the proposed Log-sum-exp based CB is more significant than DR based CB. Further, from the results it can inferred that, we can reduce the dimming level to 30430\frac{30-4}{30} = 86.6% of designed power (Pe=30P_{e}=30) for ς2=2\varsigma^{2}=2.

The bivariate normal density is specified by the 2D constellation points and the variance of these points in different dimensions. Fig. 6 shows the lines of the equal probability density (EPD) functions of the bivariate Gaussian. The center of the ellipse is the 2D constellation point and its shape is determined by the covariance matrix of the 2D constellation points. The principal axes of these ellipses are given by the eigenvectors of the covariance matrix and, semi-major and semi-minor axis are dependent on the eigenvalues, respectively [48]. For N=2N=2, the mmth constellation point of the jjth user is cjm>02×1\textbf{c}_{j}^{m}\in\mathbb{R}_{>0}^{2\times 1} and the covariance matrix of this 2D constellation point is denoted by 𝕊cjm\mathbb{S}_{\textbf{c}_{j}^{m}}. So, the center of the ellipse is cjm\textbf{c}_{j}^{m} and its shape is determined by 𝕊cjm\mathbb{S}_{\textbf{c}_{j}^{m}}. Fig. 6(a)-6(c) shows the lines of EPD for DR based constellation points and Fig. 6(d)-6(f) shows lines of EPD for Log-sum-exp based constellation points, respectively.

Refer to caption
Figure 9: BER performance comparison for J=5J=5 based on Log-sum-exp CBs for σ2=0.01,M=4\sigma^{2}=0.01,M=4.
Refer to caption
Figure 10: BER performance comparison for J=6J=6 Log-sum-exp CBs for σ2=0.01,M=4\sigma^{2}=0.01,M=4.
Refer to caption
(a) Three Users
Refer to caption
(b) Four Users
Figure 11: Theoretical and Simulated BER performance comparison for (a)J=3J=3 (b) J=4J=4 for ς2=5,σ2=0.01\varsigma^{2}=5,\sigma^{2}=0.01 and M=4.M=4.

IV-C The case with four, five and six users (J=4,5,6J=4,5,6)

Consider the case where four users share four REs. The Log-sum-exp based CB is designed for four users using Algorithm 2, and its performance is compared with DR based CB. Fig. 7 shows the BER performance of four users where Log-sum-exp based CB outperforms DR based CBs for different values of ς2\varsigma^{2}. The reason behind the performance difference can be understood from the level of overlapping between the constellation points for both CBs in Fig. 8. It can be observed in Fig. 8 that the DR based 2D constellation points suffer from significant overlapping, especially for user 1 (Fig. 8(a)) and user 4 (Fig. 8(d)), while Log-sum-exp based 2D constellation points are barely overlapping. This results in significant performance improvement for Log-sum-exp based CBs. Also in Fig. 7, the comparison with pulse amplitude modulation orthogonal multiple access (4 PAM-OMA) scheme is shown. It is noted that the proposed algorithm outperforms the OMA scheme for different values of ς2\varsigma^{2}. This is expected as the OMA scheme offers no frequency diversity in contrast to the SCMA scheme.

For five users, the complexity of generating DR based CB increases significantly. Further, the performance degrades drastically and requires a very high PeP_{e} at BER of 10310^{-3}. Therefore, the effect of varying shot noise factor ς2\varsigma^{2} with only Log-sum-exp based CBs, when five users data is being transmitted over four REs (λ=5/4)\lambda=5/4) has been shown in Fig. 9. The BER performance with respect to increasing PeP_{e} is shown in Fig. 10 for six users. Here, the effect of varying shot noise factor ς2\varsigma^{2} is shown when the proposed Log-sum-exp based CBs have been used for transmitting data over four REs.

In Fig. 11, the theoretical and simulated BER performances are compared. We find that the simulated curves match with the theoretical curves, especially for the high signal power region. These results verify the correctness of the simulated results obtained in Fig. 5 and Fig. 7. The results from Fig. 5, 7, 9 and 10 have been summarized in Table II. From Table II, we have the electrical power required to achieve BER of 10310^{-3} for different users and VLC systems with different shot noise factors.

TABLE II: Electrical power required to get BER of 10310^{-3}, for different users and ς2\varsigma^{2} at K=4K=4.
Number of Users ς2\varsigma^{2} PeP_{e}
3 1 3
3 5 5
3 10 15
4 1 6.5
4 5 29
5 1 25
5 3 >>50
6 1 >>50

V Conclusion

In this paper, a novel low-complex CB design technique has been proposed for SCMA-VLC system impaired by shot noise. This work emphasizes that the designing of specific CBs is required for the SCMA-VLC system. The proposed CBs are generated by optimizing the Log-sum of exponentials of all REDs between the superimposed codewords. With the inclusion of shot noise in the SCMA system, the overall noise variance is dependent on the strength of the incident signal, as shown in Algorithm 1. The proposed CBs provide improved BER performance as compared to CBs proposed in the existing literature along with reduced complexity. Further, the theoretical analysis of BER is also performed for the shot noise incorporated SCMA-VLC system. The simulated results were validated, and both the theoretical and simulated curves are in good agreement for high signal power regions. In the future, the performance of SCMA codebook can further be enhanced for lower PeP_{e} by designing CBs considering lower dimming requirements, and improve the performance of higher load factor scenarios in the SCMA-VLC system.

The DR criteria based SCMA CB for VLC system obtained for three users for ς2=5\varsigma^{2}=5 and Pe=30P_{e}=30 is shown below:

CB1DR=[00003.19080.45950.10900.490700004.67279.16201.80830.1476],\begin{split}\textbf{CB}_{1}^{DR}=\begin{bmatrix}0&0&0&0\\ 3.1908&0.4595&0.1090&0.4907\\ 0&0&0&0\\ 4.6727&9.1620&1.8083&0.1476\\ \end{bmatrix},\end{split}
CB2DR=[0.10742.98903.04050.130000001.35170.10778.86014.59860000],\textbf{CB}_{2}^{DR}=\begin{bmatrix}0.1074&2.9890&3.0405&0.1300\\ 0&0&0&0\\ 1.3517&0.1077&8.8601&4.5986\\ 0&0&0&0\\ \end{bmatrix},
CB3DR=[0.11190.11055.31285.31460.11235.61585.62350.117800000000].\textbf{CB}_{3}^{DR}=\begin{bmatrix}0.1119&0.1105&5.3128&5.3146\\ 0.1123&5.6158&5.6235&0.1178\\ 0&0&0&0\\ 0&0&0&0\\ \end{bmatrix}.

The Log-sum-exp based SCMA CB for VLC system obtained for three users for ς2=5\varsigma^{2}=5 and Pe=30P_{e}=30 is shown below:

CB1LS=[00002.77120.01000.01002.631700004.40899.16261.41510.0100],CB2LS=[0.01002.77852.57090.010000000.01001.40369.18884.38930000],CB3LS=[0.01005.47490.01005.47470.01005.47975.47960.010000000000].\begin{split}\textbf{CB}_{1}^{LS}=\begin{bmatrix}0&0&0&0\\ 2.7712&0.0100&0.0100&2.6317\\ 0&0&0&0\\ 4.4089&9.1626&1.4151&0.0100\\ \end{bmatrix},\\ \\ \textbf{CB}_{2}^{LS}=\begin{bmatrix}0.0100&2.7785&2.5709&0.0100\\ 0&0&0&0\\ 0.0100&1.4036&9.1888&4.3893\\ 0&0&0&0\\ \end{bmatrix},\\ \\ \textbf{CB}_{3}^{LS}=\begin{bmatrix}0.0100&5.4749&0.0100&5.4747\\ 0.0100&5.4797&5.4796&0.0100\\ 0&0&0&0\\ 0&0&0&0\\ \end{bmatrix}.\\ \end{split}

Next, the SCMA CB for VLC system generated for four users based on Log-sum-exp for ς2=5\varsigma^{2}=5 and Pe=30P_{e}=30 is shown below:

CB1LS=[00001.53833.04050.01678.979600001.34265.04830.01730.0374],\begin{split}\textbf{CB}_{1}^{LS}=\begin{bmatrix}0&0&0&0\\ 1.5383&3.0405&0.0167&8.9796\\ 0&0&0&0\\ 1.3426&5.0483&0.0173&0.0374\\ \end{bmatrix},\\ \end{split}
CB2LS=[0.01913.56364.16520.945500000.01560.56318.96832.77650000],\textbf{CB}_{2}^{LS}=\begin{bmatrix}0.0191&3.5636&4.1652&0.9455\\ 0&0&0&0\\ 0.0156&0.5631&8.9683&2.7765\\ 0&0&0&0\\ \end{bmatrix},\\ \\
CB3LS=[0.02786.50590.02576.45810.02964.19034.20630.026800000000].\textbf{CB}_{3}^{LS}=\begin{bmatrix}0.0278&6.5059&0.0257&6.4581\\ 0.0296&4.1903&4.2063&0.0268\\ 0&0&0&0\\ 0&0&0&0\\ \end{bmatrix}.\\
CB4LS=[000000000.02071.53985.03480.02640.01542.38100.38929.2690].\textbf{CB}_{4}^{LS}=\begin{bmatrix}0&0&0&0\\ 0&0&0&0\\ 0.0207&1.5398&5.0348&0.0264\\ 0.0154&2.3810&0.3892&9.2690\\ \end{bmatrix}.\\

Similarly, the SCMA CB for VLC system based on the proposed scheme for five users for ς2=5\varsigma^{2}=5 and Pe=30P_{e}=30 is shown below:

CB1LS=[00001.82290.87130.07079.363300000.20444.49111.58720.5904],\begin{split}\textbf{CB}_{1}^{LS}=\begin{bmatrix}0&0&0&0\\ 1.8229&0.8713&0.0707&9.3633\\ 0&0&0&0\\ 0.2044&4.4911&1.5872&0.5904\\ \end{bmatrix},\end{split}
CB2LS=[1.37174.81551.21900.139900000.07251.13999.02142.44090000],\textbf{CB}_{2}^{LS}=\begin{bmatrix}1.3717&4.8155&1.2190&0.1399\\ 0&0&0&0\\ 0.0725&1.1399&9.0214&2.4409\\ 0&0&0&0\\ \end{bmatrix},
CB3LS=[0.17900.34682.34498.14430.09152.98305.79360.325300000000],\textbf{CB}_{3}^{LS}=\begin{bmatrix}0.1790&0.3468&2.3449&8.1443\\ 0.0915&2.9830&5.7936&0.3253\\ 0&0&0&0\\ 0&0&0&0\\ \end{bmatrix},
CB4LS=[000000000.09361.83454.89090.65431.17090.10052.29149.0194],\textbf{CB}_{4}^{LS}=\begin{bmatrix}0&0&0&0\\ 0&0&0&0\\ 0.0936&1.8345&4.8909&0.6543\\ 1.1709&0.1005&2.2914&9.0194\\ \end{bmatrix},
CB5LS=[3.14380.15006.23221.5089000000000.13971.41863.37206.4569].\textbf{CB}_{5}^{LS}=\begin{bmatrix}3.1438&0.1500&6.2322&1.5089\\ 0&0&0&0\\ 0&0&0&0\\ 0.1397&1.4186&3.3720&6.4569\end{bmatrix}.

At last, we show the SCMA CB for VLC system based on the proposed scheme for six users for ς2=5\varsigma^{2}=5 and Pe=30P_{e}=30 as follows:

CB1LS=[00000.86772.16310.02956.526200001.86038.14260.05940.0741],\begin{split}\textbf{CB}_{1}^{LS}=\begin{bmatrix}0&0&0&0\\ 0.8677&2.1631&0.0295&6.5262\\ 0&0&0&0\\ 1.8603&8.1426&0.0594&0.0741\\ \end{bmatrix},\end{split}
CB2LS=[0.84335.93562.06820.033500000.03790.05808.66731.86180000],\textbf{CB}_{2}^{LS}=\begin{bmatrix}0.8433&5.9356&2.0682&0.0335\\ 0&0&0&0\\ 0.0379&0.0580&8.6673&1.8618\\ 0&0&0&0\\ \end{bmatrix},
CB3LS=[0.11060.02931.98459.23330.06874.74422.21920.093000000000],\textbf{CB}_{3}^{LS}=\begin{bmatrix}0.1106&0.0293&1.9845&9.2333\\ 0.0687&4.7442&2.2192&0.0930\\ 0&0&0&0\\ 0&0&0&0\\ \end{bmatrix},
CB4LS=[000000000.04761.57335.86710.04081.01040.03470.42978.9561],\textbf{CB}_{4}^{LS}=\begin{bmatrix}0&0&0&0\\ 0&0&0&0\\ 0.0476&1.5733&5.8671&0.0408\\ 1.0104&0.0347&0.4297&8.9561\\ \end{bmatrix},
CB5LS=[3.28910.06793.88730.1111000000000.03041.35193.66885.7811],\textbf{CB}_{5}^{LS}=\begin{bmatrix}3.2891&0.0679&3.8873&0.1111\\ 0&0&0&0\\ 0&0&0&0\\ 0.0304&1.3519&3.6688&5.7811\\ \end{bmatrix},
CB6LS=[00000.07889.81150.05281.98843.98621.18290.76010.03230000].\textbf{CB}_{6}^{LS}=\begin{bmatrix}0&0&0&0\\ 0.0788&9.8115&0.0528&1.9884\\ 3.9862&1.1829&0.7601&0.0323\\ 0&0&0&0\\ \end{bmatrix}.

Acknowledgment

The authors would like to thank the Associate Editor Dr. Nestor Chatzidiamantis and the anonymous reviewers for their constructive suggestions which have greatly helped to improve the quality of this work. The authors are also thankful to Mr. Vyacheslav P. Klimentyev for the publicly available codes and various discussions.

References

  • [1] S. Rajagopal, R. D. Roberts, and S. K. Lim, “IEEE 802.15.7 visible light communication: Modulation schemes and dimming support,” IEEE Commun. Mag., vol. 50, no. 3, pp. 72–82, Mar. 2012.
  • [2] M. Kavehrad, “Sustainable energy-efficient wireless application using light,” IEEE Commun. Mag., vol. 48, no. 12, pp. 66–73, Dec. 2010.
  • [3] A. Jovicic, J. Li, and T. Richardson, “Visible light communication: Opportunities, challenges and the path to market,” IEEE Commun. Mag., vol. 51, no. 12, pp. 26–31, Dec. 2013.
  • [4] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Bhargava, “A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2181-2195, Oct. 2017.
  • [5] S. Chen, Y.-C. Liang, S. Sun, S. Kang, W. Cheng, and M. Peng, “Vision, requirements, and technology trend of 6G: how to tackle the challenges of system coverage, capacity, user data-rate and movement speed,” IEEE Wireless Commun., vol. 27, no. 2, pp. 218-228, Apr. 2020.
  • [6] H. Nikopour and H. Baligh, “Sparse code multiple access,” in Proc. IEEE 24th Annu. Int. Symp. Pers., Indoor, Mobile Radio Commun., London, UK, Sep. 2013, pp. 332–336.
  • [7] R. Hoshyar, F. P. Wathan, and R. Tafazolli, “Novel low-density signature for synchronous CDMA systems over AWGN channel,” IEEE Trans. Signal Process., vol. 56, no. 4, pp. 1616–1626, Apr. 2008.
  • [8] M. Taherzadeh, H. Nikopour, A. Bayesteh, and H. Baligh, “SCMA CB design,” in Proc. IEEE 80th Veh. Technol. Conf., Vancouver, Canada, Sep. 2014, pp. 1–5.
  • [9] S. Dimitrov, S. Sinanovic, and H. Haas, “Clipping noise in OFDM based optical wireless communication systems,” IEEE Trans. Commun., vol. 60, no. 4, pp. 1072–1081, Apr. 2012.
  • [10] H. Marshoud, V. M. Kapinas, G. K. Karagiannidis and S. Muhaidat, ”Non-Orthogonal Multiple Access for Visible Light Communications,” in IEEE Photon. Technol. Lett., vol. 28, no. 1, pp. 51-54, 1 Jan.1, 2016.
  • [11] B. Lin, X. Tang, Z. Zhou, C. Lin, and Z. Ghassemlooy, “Experimental demonstration of SCMA for visible light communications,” Opt. Commun., vol. 419, pp. 36–40, July 2018.
  • [12] J. An and W.-Y. Chung, “Single-LED multichannel optical transmission with SCMA for long range health information monitoring,” J. Lightw. Technol., vol. 36, no. 23, pp. 5470–5480, 2018.
  • [13] B. Lin, X. Tang, and Z. Ghassemlooy, “A power domain sparse code multiple access scheme for visible light communications,” IEEE Wireless Commun. Lett., vol. 9, no. 1, pp. 61–64, 2019.
  • [14] R. Mitra, S. Sharma, G. Kaddoum and V. Bhatia, ”Color-domain SCMA NOMA for visible light communication”, IEEE Commun. Lett., vol. 25, no. 1, pp. 200-204, Jan. 2021.
  • [15] S. Lou, C. Gong, Q. Gao, Z. Xu, “SCMA with low complexity symmetric CB design for visible light communication,” in Proc. International Conference on Communications (ICC), July 2018, pp. 1–6.
  • [16] S. Hu, Q. Gao, C. Gong, Z. Xu, R. Boluda-Ruiz, and K. Qaraqe, “Energy-efficient modulation for visible light SCMA system with signal-dependent Noise,” in Proc. Int. Symp. Commun. Syst., Netw. Digit. Signal Process. (CSNDSP), Budapest, Hungary, Jul. 2018, pp. 1–6.
  • [17] Q. Gao, S. Hu, C. Gong, E. Serpedin, K. Qaraqe and Z. Xu, “Distance-range-oriented constellation design for VLC-SCMA downlink with signal-dependent noise,” IEEE Commun. Lett., vol. 23, no. 3, pp. 434–437, 2019.
  • [18] J. Y. Wang, J. B. Wang and Y. Wang, “Fundamental Analysis for Visible Light Communication with Input‐Dependent Noise, Optical Fiber and Wireless Communications”, PhD. Rastislav Róka (Ed.), InTech, DOI: 10.5772/68019, (2017).
  • [19] V. Dixit and A. Kumar, “An exact BER analysis of NOMA-VLC system with imperfect SIC and CSI,” AEU Int. J. Electron. Commun., vol. 138, Aug. 2021, Art. no. 153864, doi: 10.1016/j.aeue.2021.153864.
  • [20] J. M. Senior, and M. Y. Jamro, Optical Fiber Communications: Principles and Practice. 3rd ed. Prentice Hall, 2008.
  • [21] S. M. Moser, “Capacity results of an optical intensity channel with input-dependent gaussian noise,” IEEE Trans. Inform. Theory, vol. 58, no. 1, pp. 207-223, Jan. 2012.
  • [22] Q. Gao, S. Hu, and Z. Xu, “Modulation designs for visible light communications with signal-dependent noise,” J. Lightwave Technol., vol. 34, no. 23, pp. 5516-5525, Dec. 2016.
  • [23] J. Wang, H. Ge, J. Zhu, J. Wang, J. Dai, and M. Lin, “Adaptive spatial modulation for visible light communications with an arbitrary number of transmitters,” IEEE Access, vol. 6, pp. 37 108–37 123, 2018.
  • [24] K.-I. Ahn and J. K. Kwon, “Capacity analysis of M-PAM inverse source coding in visible light communications,” J. Lightw. Technol., vol. 30, no. 10, pp. 1399–1404, Jan. 2012.
  • [25] J.-B. Wang, Q.-S. Hu, J. Wang, M. Chen, and J.-Y. Wang, “Tight bounds on channel capacity for dimmable visible light communications,” J. Lightw. Technol., vol. 31, no. 23, pp. 3771–3779, Dec. 2013.
  • [26] A. Chaaban, Z. Rezki, and M.-S. Alouini, “Fundamental limits of parallel optical wireless channels: capacity results and outage formulation,” IEEE Trans. Commun., vol. 65, no. 1, pp. 296–311, Jan. 2017.
  • [27] D. N. Anwar, R. Ahmad and A. Srivastava, ”Energy-Efficient Coexistence of LiFi Users and Light Enabled IoT Devices,” in IEEE Transactions on Green Communications and Networking, doi: 10.1109/TGCN.2021.3116267.
  • [28] J. Grubor, S. Randel, K.-D. D. Langer, and J. Walewski, “Broadband information broadcasting using LED-based interior lighting,” J. Lightw. Technol., vol. 26, no. 24, pp. 3883–3892, Dec. 2008.
  • [29] L. Hanzo, H. Haas, S. Imre, D. C. O’Brien, M. Rupp, and L. Gyongyosi, “Wireless myths, realities, and futures: From 3G/4G to optical and quantum wireless,” Proc. IEEE, vol. 100, no. Centennial Special Issue, pp. 1853–1888, May 13, 2012.
  • [30] H. Chen and Z. Xu, “A two-dimensional constellation design method for visible light communications with signal-dependent shot noise,” IEEE Commun. Lett., vol. 22, no. 9, pp. 1786–1789, 2018.
  • [31] C. Bettstetter, H. Hartenstein, and X. Pérez-Costa, “Stochastic properties of the random waypoint mobility model,” Wireless Netw., vol. 10, no. 5, pp. 555–567, 2004.
  • [32] Y. Lin, Y. Liu, Y. Siu, “Low complexity message passing algorithm for SCMA system,” IEEE Communications Letters, vol. 20, issue: 12 ,pp. 2466- 2469 Dec. 2016.
  • [33] A. Bayesteh, H. Nikopour, M. Taherzadeh, H. Baligh, and J. Ma, “Low complexity techniques for SCMA detection,” in Proc. IEEE Globecom Workshops, San Diego, CA, USA, Dec. 2015, pp. 1-6.
  • [34] W. B. Ameur, P. Mary, M. Dumay, J.-F. Hˇelard, and J. Schwoerer, “Performance study of MPA, Log-MPA and Max-Log-MPA for an uplink SCMA scenario,” in Proc. 26th Int. Conf. Telecommun. (ICT), 2019, pp. 411–416.
  • [35] F. Kschischang, B. Frey, and H. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 498–519, Feb. 2001.
  • [36] J. Liu, G.Wu, S. Li, and O. Tirkkonen, “On fixed-point implementation of Log-MPA for SCMA signals,” IEEE Wireless Commun. Lett., vol. 5, no. 3, pp. 324–327, Jun. 2016.
  • [37] L. Yu, P. Fan, D. Cai, and Z. Ma, “Design and analysis of SCMA CB based on Star-QAM signaling constellations,” IEEE Trans. Veh. Technol., vol. 67, no. 11, pp. 10543-10553, 2018.
  • [38] V. P. Klimentyev and A. B. Sergienko, ”SCMA CBs optimization based on genetic algorithm,” European Wireless 2017; 23th European Wireless Conference, Dresden, Germany, 2017, pp. 1-6.
  • [39] M. Vameghestahbanati, I. Marsland, R. H. Gohary, and H. Yanikomeroglu, “Multidimensional constellations for uplink SCMA systems—A comparative study,” IEEE Commun. Surveys Tuts., vol. 21, no. 3, pp. 2169–2194, third quarter 2019.
  • [40] J. M. Luna-Rivera, V. Guerra, J. Rufo-Torres, R. Perez-Jimenez, C. Suarez- Rodriguez, and J. Rabadan-Borges, “Low-complexity colour-shift keying based visible light communications system,” IET Optoelectron., vol. 9, no. 5, pp. 191-198, Oct. 2015.
  • [41] J. Nocedal and S. J. Wright, Numerical Optimization. NewYork, NY, USA: Springer-Verlag, 1999.
  • [42] R. Chen, “Solution of minimax problems using equivalent differentiable functions,” Comput. Math. Appl., vol. 11, no. 12, pp. 1165-1169, Dec. 1985.
  • [43] D. U. Campos-Delgado, J. M. Luna-Rivera, R. Perez-Jimenez, C. A. Gutierrez, V. Guerra, and J. Rabadan, “Constellation design for color space-based modulation in visible light communications,” Phys. Commun., vol. 31, pp. 154-159, Dec. 2018.
  • [44] E. Monteiro and S. Hranilovic, “Constellation design for color-shift keying using interior point methods,” in Proc. IEEE Globecom Workshops, Dec. 2012, pp. 1224-1228.
  • [45] D. N. Anwar and A. Srivastava, “Constellation design for single photodetector based CSK with probabilistic shaping and white color balance,” IEEE Access, vol. 8, pp. 159 609–159 621, 2020.
  • [46] M. K. Simon and M.-S. Alouini, Digital Communication Over Fading Channels, 1st ed. Hoboken, NJ, USA: Wiley, 2000.
  • [47] Altera Innovate Asia FPGA Design Contest. (2015). 5G Algorithm Innovation Competition. [Online]. Available: http:// www.innovateasia.com/5g/images/pdf/1st%205G%20Algorithm% 20Innovation%20Competition-ENV1.0%20-%20SCMA.pdf.
  • [48] R.O. Duda, P.E. Hart, and D.G. Stork, Pattern Classification. John Wiley & Sons, 2001.