Você está na página 1de 6

Proceedings of the Third International Conference on Digital Information, Networking, and Wireless Communications, Moscow, Russia 2015

Fast Algorithm of LTE RACH Detection Based on


Sparse Fourier Transform

Alexey Fedorov, Vladimir Lyashev, IEEE Member, Lev Rapoport


Huawei Technologies Co., Ltd
Russian Research Center
Moscow, Russia
Email: Alexey.Fedorov@huawei.com

Abstract—In this paper, we present a fast algorithm of time


synchronization between User Equipment (UE) and Base Station
(BS) which is suitable for Long Term Evolution (LTE) Random
Access Channel (RACH). The algorithm reduces the complexity
more than 1.5 times. Further, if the SNR is above a threshold,
the algorithm allows to extremely reduce the complexity of
synchronization more than 3 times. The presented method uses
the sparse nature of a time synchronization problem, where the
spike of a cross-correlation between received signal and local
RACH preamble indicates correct time delay.
Keywords—detection; PRACH; FFT; buketization; complexity;
correlation; sparse; aliasing.

I. I NTRODUCTION
LTE is one of the rapidly growing branches in the wireless
communication systems. The number of subscribers worldwide
is rising fast. Predictions say that the amount of subscribers
will reach billion in next several years. It is the reason of
increasing traffic loads through a BS serving LTE users. The
base station proceeds the time synchronization for UE, when
UE tries to access an LTE cell, to put it in schedule of the
local cell. In LTE the process of time synchronization is called
RACH preamble detection, therefore we will use both names.
Here preamble is a special synchronization burst which has a
certain structure [1].
The state of the art of the RACH preamble detection is
based on the Fourier transform (FT) and has a complexity
of O(n log n) (see Fig. 1), where n is the number of burst Fig. 1. Baseline algorithm for primary synchronization in the random access
samples. We will call baseline algorithm, which is presented in channel.
Fig. 1. This procedure of detection is quite costly and requires
hundreds of millions of hardware multiplications, leading to
high power consumption. That is why rapid increasing of should be investigated fast DFT algorithms whose runtime is
subscribers amount will reduce the BS performance. In this sub-linear in the signal size n.
paper we discuss the optimization of synchronization part and
we will present the method, which exploits the sparse nature There is a new algorithm of DFT which works with SS –
of the synchronization problem [3]. sparse FFT (SFFT) [2]. For exactly k-sparse case, when DFT
of a signal includes k non-zeros frequencies, the complexity
Nowadays, Discrete Fourier Transform (DFT) is the most of algorithm SFFT is equal to O(k log n). Note, that the
common analysis tool. The idea to reduce complexity of complexity of DFT is reduced by the factor of n/k comparing
FT algorithms is one of the central subjects in the theory with common FFT. In general case, when DFT of signal
of algorithms. Meanwhile, in many applications most of the includes approximately k large frequencies, the complexity of
Fourier coefficients of a signal are small or even vanishing. SFFT is equal to O(k log n log(n/k)) [2].
We call such signals as Sparse Signals (SS), which means that
the signals have sparse spectrum in frequency domain. If a The main idea of SFFT is to do FFT of shorter signal,
signal has a small number k of non-zero Fourier coefficients, n/p = B in size instead of large original signal of size n, here
then the output of the DFT can be represented using only k p is an aliasing factor, B is an integer number. For this purpose
coefficients and theirs positions. Hence, for such signals, it SFFT algorithm uses random permutation of the spectrum

ISBN: 978-1-4799-6375-1 ©2015 IEEE 77


Proceedings of the Third International Conference on Digital Information, Networking, and Wireless Communications, Moscow, Russia 2015

of original signal then aliasing the result into small number where m ∈ [0, NZC − 1], u ∈ [0, NZC ], gcd(NZC , u) = 1,
of elements, and it uses filtering to avoid a leakage. After NZC is the length of the ZC sequence, for LTE RACH
these steps, the SFFT techniques allows to estimate ”heavy” preamble NZC = 839 [1].
coefficients of the FFT and theirs positions. Of course, this
One of typical methods of generation of a RACH signal
method is probabilistic, for special class of signals the method
is illustrated in Fig. 2. The frequency domain scheme of
has a good probability to correct reconstruction of Fourier
generation of the RACH signal is explained as follows:
coefficients [2].
As it was noted above, in the problem of time synchro- 1) Zadoff-Chu sequence is generated in Time Domain.
nization there is one major spike of the correlation function. 2) NZC -point DFT is used for time to frequency domain
Attempts of using of the sparseness of correlation function in transition, where NZC is prime number and has
the time domain gave rise of using sparse IFFT [3]. The sparse meaning the Zadoff-Chu sequence length. We use
IFFT algorithm proceeds as follows. Firstly, it subsamples NZC = 839 in this paper.
the frequency domain signal by an aliasing factor p. Then it 3) The output of DFT is mapped to the assigned sub-
computes the IFFT over n/p frequency samples. It is well carriers, see Fig. 3. The total number of sub-carriers
known from basic sampling theory that sub-sampling in the 2048, whereas output of DFT uses just 839 sub-
frequency domain is equivalent to aliasing in the time domain. carriers.
Thus, the output of sub-sampled IFFT step is an aliased version 4) IFFT is used for frequency to time domain conver-
of the output in the original IFFT step shown in Fig.1. sion, the output result of this step is the vector of
RACH preamble r, also we call r local code.
Let us briefly explain the method of synchronization in 5) Cyclic Prefix (CP) insertion.
GNSS via the SFFT, which is developed by a team from MIT 6) Upconvertor to carrier, to take an output signal v,
[3]. which goes to the channel.
We call bucketization [2] the procedure that hashes n
original outputs samples into n/p buckets. There is one major
correlation spike in the output of the IFFT, the amplitude of the
bucket with spike will be significantly larger than the amplitude
of other buckets where only noise samples are located. Hence,
the algorithm chooses the bucket with the largest amplitude
among the n/p buckets at the output of sub-sampled IFFT.
The chosen bucket contains p aliased samples. Each signal’s
sample corresponds to its time shift. It means, that out of p
candidate shifts from one bucket there is only one which is
the actual correlation spike. To identify the spike among these
p candidate shifts, the algorithm correlates, the received signal Fig. 2. Generation of random access signal.
with each of those p shifts of the local preamble. The offset
value produces the maximum correlation is the Correct Shift
(CS).
We call the described approach as MIT-method. Attempts
to further utilize the sparseness and minimize the computa-
tional complexity are resulted in current paper.
This paper is organized as follows. The LTE random access
channel model is described in the Section II. The preamble
detection algorithm based on modified SFFT is developed in
the Section III. The Section IV presents the performance degra-
dation analysis and an example of the selection of algorithm
parameters. Simulation conditions and the experiment results
is presented in the Section V. And the last Section VI presents
concluding remarks and declares directions of the future work.

II. S YSTEM M ODEL


Let us shortly recall the LTE RACH theory. When UE
wants to access to the BS cell, first it transmits a random access
preamble using a special case of multicarrier transmission —
Orthogonal Frequency Division Multiplexing (OFDM) [4]. The Fig. 3. Sub-carrier Mapping in LTE random access channel.
preamble is generated from Zadoff-Chu (ZC) sequence [5],
[6]. ZC sequence without cyclic shift is known as a ”root The signal v is passed through a channel. There can be
sequence”. The root of ZC sequence is parametrized by u and different models of channel hch [7]. We consider a channel
defined by with static propagation conditions. Transmission of signal
πum(m+1) √ through the channel can be defined as follows: s′ = hch ∗v +ξ.
−j
xu (m) = e NZC
, j = −1, Here ξ is an Additive white Gaussian noise (AWGN).

ISBN: 978-1-4799-6375-1 ©2015 IEEE 78


Proceedings of the Third International Conference on Digital Information, Networking, and Wireless Communications, Moscow, Russia 2015

The received signal is first pre-processed in time domain: of start point of the received signal, i.e. the first element r1
signal is passed through the Low Path Filter (LPF), which of the vector r is located in the l-th part of the vector s after
avoids aliasing after Decimation, then the result is fed into dividing s into p parts. The operation of bucketization is as
CP-removing block. After CP-removing block, the signal is fed follows:
rnew = Ψr, snew = Ψs. (2)
The new arrays are B-by-1 vectors (columns).

B. Calculation of a correlation
The correlation value on m-th shift of two new arrays snew
and rnew can be represented as follows:
Corr(m) = (S m−1 rnew )H snew , 1 ≤ m ≤ B.
Fig. 4. RACH Detection algorithm in receiver scheme.
By construction of the bucketization matrix Ψ, all values of
the correlation function Corr(m), except the one position
into RACH Detection block Fig.4. In the traditional approach, α

the algorithm of detection coincides with the method, which m∗ = k + 1, do not contain members like |rm |2 ej p η for
is shown in Fig.1. some m ∈ [1, B] and η ∈ [0, p − 1]. The correlation value αfor
m = m∗ Corr(m∗ ) contains N −K members like |rm |2 ej p η .
The statement |rm |2 = 1 follows from the properties of a ZC
III. FAST RACH D ETECTION A LGORITHM sequence. Further,
A. Bucketization α
Corr(m∗ ) = (B − k)(p − l + 1) ej p (l−1) +
α
Let us consider the special operation, which allows to + k(p − l) ej p l +
reduce the size of an array from n to B = n/p, where P α
+ rm r̄t ej p (η−ξ) = (3)
p is an aliasing factor. The special operation is required to m6=t;η,ξ
α

reduce complexity of circular convolution of two arrays. In = Rl−1 ej p (l−1) + Rl e pl +∆=
our case, we talk about convolution of received signal and = Re jϕ
+ ∆.
local preamble in receiver. P α
Here ∆ = rm r̄t ej p (η−ξ) , Rl−1 = (B − k)(p − l + 1)
There are a lot of ways to reduce a size of an array: cutting m6=t;η,ξ
of the array with deletion of members, hashing of the array into and Rl = k(p−l), R, ϕ are the length and the argument of the
a small size array, hashing of the array into a small size array maximum value of the correlation function (3), respectively.
with multiplication on complex weights. The first way is not The explanation is geometrically represented in Fig. 5. In LTE
acceptable, because of information lost. Hashing of the array practice, the value of a time delay lies in a fixed range, due to
into a small size array is called bucketization (like distribution this fact: a minimum length Rmin of a maximum vector bigger
quantities of a material between ”buckets”) than n/2.
Denote by Ψ(α, p) the matrix of bucketization:
jα j(p−1)α
Ψ(α, p) = (IB×B , e p · IB×B , . . . , e p · IB×B ), (1)
where j is the imaginary unit, α is angle of rotation, IB×B
is identity matrix of size B-by-B. Note, by default we use
Ψ instead of Ψ(α, p) in the text below. If we want to specify
values of α or p, then we use expression Ψ(α, p) with specified
values. Let us define the n-by-n matrix of shifts C,
 
01×n−1 0
C= ;
In−1×n−1 0n−1×1
and the B-by-B matrix of cyclic shift S,
 
01×B−1 1
S= .
IB−1×B−1 0B−1×1
The matrix of shifts C will be used for setting of a spreading
time delay of a signal, the matrix of cyclic shifts S will be
used for calculation correlation values.
Let us consider a purified scenario, where the received
signal consists of time delay only and the local preamble
r. The time delay equals K samples. For the explanation of Fig. 5. Definition of Maximum element’s argument.
the algorithm we use the signal s without CP: s = C K r =
[0, 0, . . . , 0, r1 , r2 , . . . , rn−K ]. Furthermore, we assume K = Obviously, according to the Fig. 5 the floor l can be
(l − 1)B + k, k ∈ [0, B − 1], l ∈ [1, p], here l is called floor estimated by using an angle ϕ of the maximum element. The

ISBN: 978-1-4799-6375-1 ©2015 IEEE 79


Proceedings of the Third International Conference on Digital Information, Networking, and Wireless Communications, Moscow, Russia 2015

value of ∆ can be the cause of incorrect estimation. Let us The full algorithm description of the proposed method is
rewrite (3) in the following form: Corr(m∗ ) = R′ ej(ϕ+θ) . presented in the Section IV.
Here the variable θ is a phase error Fig. 5.
Let us estimate possible ranges of θ. For this purpose we
need to analyze a behavior of the value ∆, but we suggest
better solution for considered problem such that the maximum
radius ρ∆ of an error circle (the error circle is defined in Fig.5)
should be calculated for all possible variants of time shifts and
for all ZC sequences. There was empirically obtained a relation
p
for radius of the error circle: ρ∆ = 400 n. This relation was
calculated for p = 8, p = 4 and p = 2.
Based on the relation for the radius the phase error θ can
be estimated as follows:
  
|θ| ≤ sin−1 Rρmin

= sin−1 200p p
≈ 200 . (4)
Obviously, from the inequality (4) that the phase error crucially
depends on aliasing parameter p. The higher the value of p,
the greater the value of θ. As it shown above, the maximum
element of correlation function Corrmax = Corr(m∗ ) can be
located in sector
 
α α
Corrmax ∈ (l − 1) − |θ|, l + |θ| . (5)
p p

C. Correct Shift and ”Floor” estimation


In this subsection we explain how to estimate the Correct
Shift (see explanation of MIT method in section I). We
consider the output array of the correlation function Corr,
which is calculated using bucketization with parameters α, p.
Let ϕ be the angle of maximum element Corrmax . Denote
by f l the value of the floor. The floor can be calculated as
follows: !
ϕ  pϕ 
f l = round α = round . (6) Fig. 6. Implementation of the proposed algorithm for n = 1024 and p = 8.
p α Here are 8 different time delays, the algorithm allows to find all positions.
Dashed lines mean division of the long array of measurements into eight
We assume, that the received signal’s start point is located on buckets. Note, here pictured 8 separate scenarios with different delays. The
sample (l − 1)B + k + 1. Actually, it means that f l equals algorithm had worked 8 times to calculate all delays.
(l − 1). Denote by fel an estimation of f l. Equation (3) can be
represented as follows:
jα jα
Corr(m∗ ) = (B−k)(p−l+1)e p (l−1) +k(p−l)e p l +∆, (7) D. Runtime

where m = k + 1. Due to (7) and Fig.5 estimation of the
Computational scheme of the proposed method described
floor can be equal to l − 1 or l, the result depends on k and
in the Appendix consists of five steps. Computational complex-
∆. There are two ways to check correlation between s and
ity is estimated according to this scheme and is summarized in
r: at shift sh1 = B(fel − 1) + m∗ , at shift sh2 = B fel + m∗ . the Table I. Note, our algorithm is very similar to the traditional
Checking of the correlation can be done using only B samples method of synchronization Fig.1 with except of two steps: Step
[3]: 1 – bucketization and Step 5 – Find the CS. These two steps
A1 = (s(sh1 : sh1 + B − 1))H r(1 : B), are absent in the traditional approach (see Table I).
(8)
A2 = (s(sh2 : sh2 + B − 1))H r(1 : B).
The correct shift cs gives the biggest correlation value. For TABLE I. C OMPARISON OF COMPUTATIONAL COMPLEXITIES
f l = l − 1: if there is estimated fel = l − 1, then A2 > A1 Traditional MIT Proposed
and cs = sh2 ; else if there is fel = l, then A1 > A2 and 1. Bucketization - n 2n
2. FFT n log n B log B B log B
cs = sh1 . The case, where A2 is bigger than A1 means that 3. Multiplication n B B
the floor was estimated correctly. Furthermore, if there exists 4. IFFT n log n B log B B log B
a threshold T hr, which is based on statistical data of previous 5. Find the CS - 2n 2B
measurements, then the algorithm should calculate just one TOTAL (n = 2048, p = 4) 47104 15872 14848
Coefficient of Reduction 1 2.97 3.17
correlation value, for example A2 , and compare the correlation
value with the threshold: if A2 > T hr, then cs = sh2 ; else
cs = sh2 − B.

ISBN: 978-1-4799-6375-1 ©2015 IEEE 80


Proceedings of the Third International Conference on Digital Information, Networking, and Wireless Communications, Moscow, Russia 2015

IV. P ERFORMANCE D EGRADATION AND PARAMETERS Here equality (ΨΨH ) = p IB×B is satisfied by the construc-
S ELECTION tion of bucketization matrix (1). The ratio of the variation of
ζ to the deterministic part of (10)
Description in the previous section shows the main benefit
of the suggested method is Reducing of the Complexity of De- σ 2 pd
tection Algorithm. In this section we analyze the performance ΞM OD = = σ 2 p.
d
of the proposed algorithm. Looking ahead, it is worth to note This is the ratio for proposed method.
that our method causes of detection performance degradation.
As it shown above, the error variance increases p times. It
means that the procedure of bucketization leads degradation of
A. Performance degradation the detection performance. Both methods (MIT and proposed)
For simplicity of an explanation, we use a channel with lead a performance degradation. MIT and proposed methods
static propagation conditions and without spreading time delay: are trade-off between a complexity reduction and an accuracy
degradation.
s′ = r + ξ.
B. Parameters selection
Here r is a local preamble, ξ is AWGN noise with a variance
σ2 . In this subsection we explain how to choose rotation and

aliasing parameters of proposed algorithm. Let us consider
The maximum value of the correlation function between s AWGN static propagation channel and a signal with time delay
and r is equal to a scalar multiplication: in K samples:
MT RD = rH s′ = rH r + rH ξ = n + rH ξ. (9) s′ = C K r + ξ. (12)
According to (5) and Fig. 5, the angle α and the aliasing
Let us denote by η the process rH ξ. The value η is a random parameter p should satisfy the condition:
process with zero mean E[η] = E[rH ξ] = rH E[ξ] = 0, and
the variation 1α
> θ. (13)
H H H H H H 2 2
2p
E[ηη ] = E[r ξξ r] = r E[ξξ ]r = r σ In×n r = σ n.
Obviously, the phase error increases for a signal with a noise.
Here η is the random part and n is the deterministic part of Let us calculate the maximum value of the correlation function
MT RD . The ratio of the variation of η to the deterministic part for signal (12) after bucketization:
of (9) is defined as follows: ∗
Corr(m∗) = (S (m −1) rnew ).H s′new =

σ2 n = (S (m −1) rnew )H (snew + Ψξ)
ΞT RD = = σ2 . ∗
n = (S (m −1) rnew )H snew + (14)
(m∗ −1)
This is the ratio for the traditional method. +(S rnew )H Ψξ =

= R e + ∆ + ∆n .
Let us consider the proposed method for some α and p.
Operation of bucketization gives us next expression: Here (14) we denote by ∆n the variable ζ (10). As it shown
in (11) √the highest value of the square root of the variance
s′new = Ψr + Ψξ. σζ = σ pn. Thus, due to the three-sigma rules, the radius of
the error circle Fig. 5, which covers 99.73% of all deviations,
Maximum value of the correlation function after bucketization is equal to r3σ = ρ∆ + 3σζ .
is equal to scalar multiplication:
Example: Let us estimate θ in case σ = 1/3 and p = 8:
MM OD = (Ψr)H s′new = rH ΨH Ψr + rH ΨH Ψξ = d + ζ.  r 
−1 −1 8 4·8
(10) |θ| < sin (r3σ ) = sin + < 0.17.
Here d = rH ΨH Ψr, ζ = rH ΨH Ψξ. It can be clearly shown, 200 2048
that the expression d = rH Ψ(0, p)H Ψ(0, p)r is equal to n and The last expression means that the parameter α due to (13),
for any α the maximum value of d satisfies next inequality: α ≥ 2.72 rad. Finally, for σ = 1/3
it is enough to use α = π and p = 8. Under these conditions
max[rH Ψ(α, p)H Ψ(α, p)r] = n. a runtime of the proposed algorithm is O(n), see Table I.
r

Note, in case α = 0 we need to use MIT method instead of


proposed method. C. Proposed Algorithm
Inputs: s′ , r and parameters α, p.
The value ζ is a random process with zero mean E[ζ] =
Outputs: Correct Shift cs estimation.
E[rH ΨH Ψξ] = rH ΨH ΨE[ξ] = 0, and variation
1) Bucketization:
E[ζζ H ] = E[rH ΨH Ψξξ H ΨH Ψr] =
= rH ΨH ΨE[ξξ H ]ΨH Ψr = snew = Ψ(α, p) · s, rnew = Ψ(α, p) · r
= rH ΨH Ψσ 2 In×n ΨH Ψr (11) 2) Small size FFT:
= σ 2 rH ΨH (ΨΨH )Ψr = S = FFT(snew ), R = FFT(rnew )
= σ 2 rH ΨH p IB×B Ψr = σ 2 p d. 3) Multiplication:

ISBN: 978-1-4799-6375-1 ©2015 IEEE 81


Proceedings of the Third International Conference on Digital Information, Networking, and Wireless Communications, Moscow, Russia 2015

TABLE II. P ERCENTAGE OF RACH PREAMBLES CORRECT DETECTION


Vi = Si · RiH , i = 1, · · · , B FOR AWGN CHANNEL
Note: The algorithm can precompute R and store
Static AWGN Channel
R in the frequency domain. There are several vari- Traditional method
ants of choosing parameters α, p, and the vector R SNR -15 dB -14 dB -13 dB -12 dB -11 dB -10 dB
can be precomputed for all these variants. 100% 100% 100% 100% 100% 100%

4) Small size IFFT: p MIT method


v = IFFT(V ) 2 100.0% 100.0% 100.0% 100.0% 100.0% 100.0%
4 97.9% 99.6% 100.0% 100.0% 100.0% 100.0%
5) Find the correct shift: 8 77.4% 88.2% 95.1% 98.5% 99.6% 99.8%
Inputs: v, s, r, T hr
p Proposed method
• Find the element Emax with maximum mag- 2 100.0% 100.0% 100.0% 100.0% 100.0% 100.0%
nitude in the vector v and its position m∗ . 4 97.9% 99.6% 100.0% 100.0% 100.0% 100.0%
8 77.5% 88.2% 95.2% 98.5% 99.6% 99.8%
Estimate the phase ϕ of Emax .
• Estimate the floor fel of the start point local-
ization (6).
Analysis shows advantages as well as disadvantages of the
• In case fel = 0 choose cs = m∗ , in another proposed method. Reasonable trade-off between complexity
case go further. reduction and accuracy degradation is controlled by aliasing
• Calculate: sh = B · fel + m∗ , parameter p depending on SNR. For setup p = 4, n = 2048
A = (s(sh : sh + B − 1))H · r(1 : B). we can obtain latency reduction in 3 times, while performance
degradation is about 5 dB that is satisfied to the system
• Compare with threshold: if A > T hr, then requirements for LTE base station.
cs = sh, else cs = sh − B.
Note: The value T hr can be precomputed On the system level we always have trade-off between time
using previous measurements. for resource allocation (due to RACH) and the physical uplink
Outputs: cs control channel (PUCCH) load. For dynamic scheduling we
need processing a lot of scheduling requests via PUCCH. For
cell edge users we can obtain poor synchronization conditions
V. S IMULATION
and compensate time offset by special technique [8]. When
The proposed method is tested in LTE RACH synchro- control channel is overloaded, part of users can repeat the
nization and compared with traditional and MIT methods requests or reuse random access for synchronization improve-
(see Table II). There are simulated the transmitter and the ment and resource scheduling. RACH procedures based on
receiver with a single antenna, the number of iterations is proposed algorithm can be faster than scheduling request
50000. The signal includes the preamble with probability 50%. repetition that is new reason for further optimization to find a
Requirements [7] for this simulation are follows: probability balance between load of PUCCH and usage of PRACH.
of a correct detection shall be equal or exceed 99% for
In the future work we plan to investigate potential capabil-
SN R = −11dB for a static propagation AWGN channel with
ities of the method in multiuser case using system level sim-
a single path; probability of a false alarm should be less 0.1%.
ulator to define right balance between PRACH and PUCCH.
All requirements are reached. The last means that proposed
method can be applied in RACH synchronization issues.
R EFERENCES
The scenario of an LTE RACH synchronization is simu-
[1] S. Sesia, I. Toufik, M. Baker, LTEthe UMTS long term evolution : from
lated as follows: theory to practice 2nd ed.
1) Generation of RACH preamble (see Fig. 2) in upsam- [2] H. Hassanieh, P. Indyk, D. Katabi, and E. Price. ”Nearly optimal sparse
fourier transform”. In STOC 2012.
pling rate (30.72 MHz) using RACH signal structure,
[3] H. Hassanieh, F. Adib, D. Katabi, and P. Indyk, ”Faster GPS Via the
which is defined in Fig. 3. Sparse Fourier Transform”. ACM MOBICOM, August 2012.
2) Simulation of transmission through single path of [4] I. Koo, S. Shin, and K. Kim, ”Performance Analysis of Random Access
static propagation in AWGN channel (SNR from -15 Channel in OFDMA Systems,” Systems Communications, 2005.
dB to -10dB). [5] D. Chu, ”Polyphase codes with good periodic correlation properties”,
3) Receiving the signal Fig. 4 and feeding it in down- IEEE Trans. Inf. Theory, 1972, 18, (4), pp. 531532.
sampling rate (2.56 MHz) to the RACH detecting [6] B. M. Popovic, ”Generalized Chirp-Like polyphase sequences with
block. optimum correlaiton properties”, IEEE tran. Infom. Theory, vol. 38, no.
4, 1992.
[7] 3GPP TS 36.104 V10.2.0 (2011-05).
[8] V. Lyashev, I. Oseledets, D. Zheng, ”Tensor-Based Multiuser Detection
and Intra-Cell Interference Mitigation in LTE PUCCH”, Telecommuni-
VI. C ONCLUSION cations Forum (TELFOR), 2013 21st, pp.385-388, 26-28 Nov. 2013.
This paper presents the fast RACH preamble detection
algorithm. The main feature of the algorithm consists in
compression of the received signal using its complex-valued
linear combinations. The algorithm allows us to reduce the
computational complexity while performing the synchroniza-
tion of the received signal with the locally generated replica.

ISBN: 978-1-4799-6375-1 ©2015 IEEE 82

Você também pode gostar