Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fredrik Brännström is active.

Publication


Featured researches published by Fredrik Brännström.


IEEE Transactions on Information Theory | 2005

Convergence analysis and optimal scheduling for multiple concatenated codes

Fredrik Brännström; Lars Kildehöj Rasmussen; Alex J. Grant

An interesting practical consideration for decoding of serial or parallel concatenated codes with more than two components is the determination of the lowest complexity component decoder schedule which results in convergence. This correspondence presents an algorithm that finds such an optimal decoder schedule. A technique is also given for combining and projecting a series of three-dimensional extrinsic information transfer (EXIT) functions onto a single two-dimensional EXIT chart. This is a useful technique for visualizing the convergence threshold for multiple concatenated codes and provides a design tool for concatenated codes with more than two components.


IEEE Transactions on Communications | 2002

Iterative detectors for trellis-code multiple-access

Fredrik Brännström; Tor Aulin; Lars Kildehöj Rasmussen

Trellis-code multiple-access (TCMA) is a narrow-band multiple-access scheme based on trellis-coded modulation. There is no bandwidth expansion, so K users occupy the same bandwidth as one single user. The load of the system, in number of bits per channel use, is therefore much higher than the load in, for example, conventional code-division multiple-access systems. Interleavers are introduced as a new feature to separate the users. This implies that the maximum-likelihood sequence detector (MLSD) is now too complex to implement. Iterative detectors are therefore suggested as an alternative to the joint MLSD. The conventional interference cancellation (IC), detector has lower complexity than the MLSD, but its performance is shown to be far from acceptable. Even after a novel improvement of the IC detector, the performance is unsatisfactory. Instead of using IC, another iterative detector is suggested. This detector updates the branch metric for every iteration, and avoids the standard Gaussian approximation. Simulations show that the performance of this detector can be close to single-user performance, even when the interleaver and the phase offset are the only user-specific features in the TCMA system.


IEEE Transactions on Vehicular Technology | 2016

Radio Resource Management for D2D-Based V2V Communication

Wanlu Sun; Erik G. Ström; Fredrik Brännström; Kin Cheong Sou; Yutao Sui

Direct device-to-device (D2D) links are proposed as a possible enabler for vehicle-to-vehicle (V2V) communications, where the incurred intracell interference and the stringent latency and reliability requirements are challenging issues. In this paper, we investigate the radio resource management problem for D2D-based V2V communication. First, we analyze and transform the latency and reliability requirements of V2V communication into optimization constraints that are computable using only the slowly varying channel information. This transformation opens up the possibility of extending certain existing D2D techniques to cater to V2V communication. Second, we propose a problem formulation that fulfills the different requirements of V2V communication and traditional cellular communication. Moreover, a Separate resOurce bLock and powEr allocatioN (SOLEN) algorithm is proposed to solve this problem. Finally, simulations are presented to evaluate different schemes, which illustrate the necessity of careful design when extending D2D methods to V2V communication, as well as show promising performance of the proposed SOLEN algorithm.


IEEE Communications Letters | 2015

Error Floor Analysis of Coded Slotted ALOHA Over Packet Erasure Channels

Mikhail Ivanov; Fredrik Brännström; Alexandre Graell i Amat; Petar Popovski

We present a framework for the analysis of the error floor of coded slotted ALOHA (CSA) for finite frame lengths over the packet erasure channel. The error floor is caused by stopping sets in the corresponding bipartite graph, whose enumeration is, in general, not a trivial problem. We therefore identify the most dominant stopping sets for the distributions of practical interest. The derived analytical expressions allow us to accurately predict the error floor at low to moderate channel loads and characterize the unequal error protection inherent in CSA.


global communications conference | 2014

D2D-based V2V communications with latency and reliability constraints

Wanlu Sun; Erik G. Ström; Fredrik Brännström; Yutao Sui; Kin Cheong Sou

Direct device-to-device (D2D) communication has been proposed as a possible enabler for vehicle-to-vehicle (V2V) applications, where the incurred intra-cell interference and the stringent latency and reliability requirements are challenging issues. In this paper, we investigate the radio resource management problem for D2D-based V2V communications. Firstly, we analyze and mathematically model the actual requirements for vehicular communications and traditional cellular links. Secondly, we propose a problem formulation to fulfill these requirements, and then a Separate Resource Block allocation and Power control (SRBP) algorithm to solve this problem. Finally, simulations are presented to illustrate the improved performance of the proposed SRBP scheme compared to some other existing methods.


IEEE Transactions on Wireless Communications | 2016

Cluster-Based Radio Resource Management for D2D-Supported Safety-Critical V2X Communications

Wanlu Sun; Di Yuan; Erik G. Ström; Fredrik Brännström

Deploying direct device-to-device (D2D) links is a promising technology for vehicle-to-X (V2X) applications. However, intracell interference, along with stringent requirements on latency and reliability, are challenging issues. In this paper, we study the radio resource management problem for D2D-based safety-critical V2X communications. We first transform the V2X requirements into the constraints that are computable using slowly varying channel state information only. Secondly, we formulate an optimization problem, taking into account the requirements of both vehicular users (V-UEs) and cellular users (C-UEs), where resource sharing can take place not only between a V-UE and a C-UE but also among different V-UEs. The NP-hardness of the problem is rigorously proved. Moreover, a heuristic algorithm, called Cluster-based Resource block sharing and pOWer allocatioN (CROWN), is proposed to solve this problem. Finally, simulation results indicate promising performance of the CROWN scheme.


IEEE Transactions on Information Theory | 2009

Classification of Unique Mappings for 8PSK Based on Bit-Wise Distance Spectra

Fredrik Brännström; Lars Kildehöj Rasmussen

The performance of bit-interleaved coded modulation (BICM) with (or without) iterative decoding (ID) is significantly influenced by the mapping of bits to the symbol constellation. Our main objective in this paper is to develop a systematic design approach for BICM-ID schemes, ensuring the best possible performance with iterative decoding. Although useful mappings for BICM-ID have been found based on various search strategies, no attempt has been made to systematically enumerate and classify all unique mappers for a given constellation. As the basis for a systematic enumeration and classification, we define the average bit-wise distance spectrum for a mapping from bits to symbols. Different bit-wise distance spectra are derived assuming no prior information or full prior information, respectively. The bit-wise distance spectra determine corresponding bit-wise error probability and bit-wise mutual information. The latter allows us to use the classification of mappings with unique bit-wise distance spectra to also classify mappings with unique extremal points in the corresponding extrinsic information transfer (EXIT) curves. As an example of our approach, we classify 8PSK mappings into 86 classes of unique mappings according to bit-wise distance spectra. The classification can be used to significantly reduce the complexity of the search for suitable mappers for BICM-ID. For 8PSK and a given encoder, only 86 different mappings need to be investigated. As examples of the systematic design approach, the best 8PSK mappings for minimizing the convergence threshold are found for concatenation with the rate 1/2 (5,7)8 and (133,171)8 convolutional codes, and the rate 1/2 UMTS turbo code with identical constituent convolutional codes (15/13)8.


IEEE Transactions on Information Theory | 2014

High-SNR Asymptotics of Mutual Information for Discrete Constellations With Applications to BICM

Alex Alvarado; Fredrik Brännström; Erik Agrell; Tobias Koch

The asymptotic behavior of the mutual information (MI) at high signal-to-noise ratio (SNR) for discrete constellations over the scalar additive white Gaussian noise channel is studied. Exact asymptotic expressions for the MI for arbitrary one-dimensional constellations and input distributions are presented in the limit as the SNR tends to infinity. Asymptotics of the minimum mean-square error (MMSE) are also developed. It is shown that for any input distribution, the MI and the MMSE have an asymptotic behavior proportional to a Gaussian Q-function, whose argument depends on the minimum Euclidean distance of the constellation and the SNR. Closed-form expressions for the coefficients of these Q-functions are calculated.


information theory workshop | 2011

High SNR bounds for the BICM capacity

Alex Alvarado; Fredrik Brännström; Erik Agrell

In this paper, different aspects of the bit-interleaved coded modulation (BICM) capacity for the Gaussian channel are analyzed. Analytical bounds for the BICM capacity are developed. These bounds suggest that the BICM capacity at high signal-to-noise ration (SNR) is determined by the multiplicity of the minimum Euclidean distance over all the subconstellations generated by the mapper. Based on this observation, we conjecture that for any constellation, the highest BICM capacity at high SNR is always obtained by a Gray code, if one exists. Ready-to-use expressions based on Gauss — Hermite quadratures to compute the coded modulation and BICM capacities for any SNR are also presented. Using these expressions, it is shown that the BICM capacity is in general a nonconvex, nonconcave function of the input bit distribution. For 8PAM and 8PSK, there exist 12 and 7 classes of mappings, respectively, with equivalent high-SNR behavior, of which the best class comprises all Gray codes.


global communications conference | 2001

Constellation-constrained capacity for trellis code multiple access systems

Fredrik Brännström; Tor Aulin; Lars Kildehöj Rasmussen

Trellis code multiple access (TCMA) is a narrowband multiple access scheme. There is no bandwidth expansion, so K users are using the same bandwidth as one single user. The load (the number of bits per channel use) of the system is therefore much higher than the load in, for example, conventional CDMA systems. It is shown here that the maximum number of users in a TCMA system is usually modest. This fact is based on constellation-constrained capacity, ie, the maximum capacity of a system with a specific constellation of the transmitted symbols. The minimum required signal-to-noise ratio for reliable transmission is also given for different code rates.

Collaboration


Dive into the Fredrik Brännström's collaboration.

Top Co-Authors

Avatar

Alexandre Graell i Amat

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Erik Agrell

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alex Alvarado

University College London

View shared research outputs
Top Co-Authors

Avatar

Christian Häger

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Erik G. Ström

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mikhail Ivanov

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Wanlu Sun

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Alex J. Grant

University of South Australia

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge