Professional Documents
Culture Documents
Terative (Turbo) Soft Interference Cancellation and Decoding For Code D CDMA - Communications
Terative (Turbo) Soft Interference Cancellation and Decoding For Code D CDMA - Communications
7, JULY 1999
Abstract— The presence of both multiple-access interference largely into two categories: linear detectors and nonlinear de-
(MAI) and intersymbol interference (ISI) constitutes a major im- tectors. A linear detector is comprised of a linear filter applied
pediment to reliable communications in multipath code-division to the received signal, followed by a scalar quantizer. The
multiple-access (CDMA) channels. In this paper, an iterative
receiver structure is proposed for decoding multiuser informa- nonlinear detectors are based primarily on various techniques
tion data in a convolutionally coded asynchronous multipath for successive cancellation of interference.
DS-CDMA system. The receiver performs two successive soft- Most of the previous work on multiuser detection focused
output decisions, achieved by a soft-input soft-output (SISO) on uncoded CDMA systems, i.e., on the demodulation of
multiuser detector and a bank of single-user SISO channel
multiuser signals. Since in practice, most CDMA systems
decoders, through an iterative process. At each iteration, extrinsic
information is extracted from detection and decoding stages employ error control coding and interleaving, recent work in
and is then used as a priori information in the next iteration, this area has addressed multiuser detection for coded CDMA
just as in Turbo decoding. Given the multipath CDMA chan- systems. In [6], it is shown that the optimal decoding scheme
nel model, a direct implementation of a sliding-window SISO for an asynchronous convolutionally coded CDMA system
multiuser detector has a prohibitive computational complexity.
A low-complexity SISO multiuser detector is developed based
combines the trellises of both the asynchronous multiuser
on a novel nonlinear interference suppression technique, which detector and the convolutional code, resulting in a prohibitive
makes use of both soft interference cancellation and instantaneous computational complexity , where is the number of
linear minimum mean-square error filtering. The properties of users in the channel, and is the code constraint length. In
such a nonlinear interference suppressor are examined, and an [7], some low-complexity receivers which perform multiuser
efficient recursive implementation is derived. Simulation results
demonstrate that the proposed low-complexity iterative receiver symbol detection and decoding either separately or jointly are
structure for interference suppression and decoding offers signif- studied.
icant performance gain over the traditional noniterative receiver Recently iterative (“Turbo”) processing techniques have
structure. Moreover, at high signal-to-noise ratio, the detrimental received considerable attention followed by the discovery of
effects of MAI and ISI in the channel can almost be completely the powerful Turbo codes . The so-called Turbo-principle
overcome by iterative processing, and single-user performance
can be approached. can be successfully applied to many detection/decoding prob-
lems such as serial concatenated decoding, equalization, coded
Index Terms— Coded CDMA, instantaneous MMSE filtering, modulation, multiuser detection and joint source and channel
multiuser detection, soft interference cancellation, Turbo process-
ing. decoding [9]. In particular, a Turbo equalization scheme is
proposed in [4] for convolutionally coded digital transmission
over intersymbol interference channel. More recently, in [11]
I. INTRODUCTION an optimal iterative multiuser detector for synchronous coded
CDMA system is derived, based on iterative techniques for
O VER THE PAST decade, a significant amount of re-
search has addressed various multiuser detection meth-
ods for interference suppression in code-division multiple-
cross-entropy minimization. A practical suboptimal implemen-
tation is also presented. The computational complexity of this
access (CDMA) communication systems [19]. The high com- method, however, is , which is still prohibitive
putational complexity of the optimal multiuser detectors (which for channels with medium to large number of users. A similar
is exponential in terms of the number of users in the channel) work has also appeared in [16].
has motivated the study of a number of low-complexity subop- The presence of both multiple-access interference (MAI)
timal multiuser detectors. These low-complexity methods fall and intersymbol interference (ISI) constitutes a major im-
pediment to reliable CDMA communications in multipath
Paper approved by J. Huber, the Editor for Coding & Coded Modulation channels. Linear techniques for joint multiuser detection and
for the IEEE Communications Society. Manuscript received March 30, 1998;
revised September 9, 1998 and December 20, 1998. This work was supported equalization have been proposed as effective ways for combat-
by the the National Science Foundation under Grant NCR-9613108. This ing both types of interference [20]. The purpose of this paper
paper was presented in part at the 1998 IEEE 6th International Conference is to develop low-complexity iterative multiuser receivers
on Universal Personal Communications (ICUPC’98) and at the 32nd Annual
Asilomar Conference on Signals, Systems and Computers. for coded CDMA systems over multipath channels. The rest
X. Wang is with the Department of Electrical Engineering, Texas A&M of the paper is organized as follows. In Section II, the
University, College Station, TX 77843 USA. multipath CDMA signal model is presented, and the iterative
H. V. Poor is with the Department of Electrical Engineering, Princeton
University, Princeton, NJ 08544 USA (e-mail: poor@princeton.edu). (Turbo) receiver structure for multiuser detection and decoding
Publisher Item Identifier S 0090-6778(99)05225-3. is outlined. In Section III, a soft-input soft-output (SISO)
0090–6778/99$10.00 1999 IEEE
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1047
convolutional channel decoder is described. In Section IV, The transmitted signal due to the th user is given by
an exact SISO multiuser detector for synchronous CDMA
channel is first derived; then a low-complexity approximate
(1)
SISO multiuser detector is developed, which is based on soft
interference cancellation and linear minimum mean-square
error (MMSE) filtering. In Section V, the exact as well as a where is the number of data symbols per user per frame,
low-complexity approximate sliding-window SISO multiuser is the symbol interval, and and
detectors are developed for multipath CDMA channels. Sec- denote, respectively, the amplitude and normalized signaling
tion VI contains the conclusions. waveform of the th user. It is assumed that is supported
only on the interval and has unit energy. The th user’s
signal propagates through a multipath channel with
II. SYSTEM DESCRIPTION impulse response
A. Signal Model
(2)
We consider a convolutionally coded CDMA system
with users, employing normalized modulation waveforms
, and signaling through respective multipath where is the number of paths in the th user channel and
channels with additive white Gaussian noise. The block and are, respectively, the complex gain and delay of the
diagram of the transmitter-end of such a system is shown in th path of the th user’s signal. At the receiver, the received
the upper half of Fig. 1. The binary information data signal due to the th user is then given by
for user , are convolutionally encoded with
code rate . A code-bit interleaver is used to reduce the
influence of the error bursts at the input of each channel
(3)
decoder. The interleaved code-bits of the th user are BPSK
symbol mapped, yielding data symbols of duration . Each
data symbol is then modulated by a spreading waveform where denotes convolution. The received signal at the
, and transmitted through the multipath channel. receiver is the superposition of the users’ signals plus the
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
1048 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 7, JULY 1999
additive white Gaussian noise, given by where the second equality will be shown in the next sec-
tion [cf. (16)]. It is seen from (7) that the output of the
(4) SISO channel decoder is the sum of the prior information
, and the extrinsic information delivered
by the channel decoder. As will be seen in the next section,
where is a zero-mean complex white Gaussian noise this extrinsic information is the information about the code
process with unit power spectral density, and is the variance bit gleaned from the prior information about the other
of the ambient channel noise. code bits, , based on the trellis constraint
of the code. The SISO channel decoder also computes the
B. Iterative (Turbo) Multiuser Receiver Structure a posteriori LLR of every information bit, which is used to
The iterative (Turbo) receiver structure is shown in the lower make decision on the decoded bit at the last iteration. After
half of Fig. 1. It consists of two stages: a SISO multiuser interleaving, the extrinsic information delivered by the
detector, followed by parallel single-user SISO channel channel decoders is then fed back to the SISO
decoders. The two stages are separated by deinterleavers multiuser detector, as the prior information about the code
and interleavers. The SISO multiuser detector delivers the a bits of all users, in the next iteration. Note that at the first
posteriori log-likelihood ratio (LLR) of a transmitted “ ” iteration, the extrinsic information and
and a transmitted “ ” for every code bit of every user, are statistically independent. But subsequently since they use
the same information indirectly, they will become more and
more correlated and finally the improvement through the
iterations will diminish.
(5)
Using Bayes’ rule, (5) can be written as III. SISO CHANNEL DECODER
The input to the th SISO channel decoder are the a priori
LLR’s (or equivalently, probability distributions) of the code
bits of the th user. It delivers as output an update of the LLR’s
of the code bits, as well as the LLR’s of the information bits,
(6) based on the code constraints. In this section, we outline a
procedure for computing the LLR’s of the information and
where the second term in (6), denoted by , represents
code bits, which is essentially a slight modification of the
the a priori LLR of the code bit , which is computed by
algorithm in [1].
the channel decoder of the th user in the previous iteration,
Consider a binary rate convolutional encoder of overall
interleaved and then fed back to the SISO multiuser detector.
constraint length . The input to the encoder at time is
(The superscript indicates the quantity obtained from the
the block and the corresponding output
previous iteration). For the first iteration, assuming equally
is . The state of the trellis at time can
likely code bits, i.e., no prior information available, we then
be represented by a -tuple, as
have , for and . The
first term in (6), denoted by , represents the extrinsic . Denote the input information
information delivered by the SISO multiuser detector, based bits that cause the state transition from to
on the received signal , the structure of the multiuser signal by and the corresponding output code bits by .
given by (3) and (4), the prior information about the code bits Suppose that the encoder starts in state . An information
of all other users, , and the prior bit stream , are the input to the encoder, followed by
information about the code bits of the th user other than the blocks of all zero inputs, causing the encoder to end in state
th bit, . The extrinsic information , , where . Let denote the output of the
which is not influenced by the a priori information channel encoder at time . We use the notation
provided by the channel decoder, is then reverse interleaved (8)
and fed into the th user’s channel decoder, as the a priori
information in the next iteration. Define the forward and backward recursions as follows [1]
Based on the prior information , and the trellis
structure (i.e., code constraints) of the channel code, the th (9)
user’s SISO channel decoder computes the a posteriori LLR
of each code bit
(10)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1049
A direct implementation of the recursions (9) and (10) is of . It is seen from (16) that the output of the SISO channel
numerically unstable, since both and drop toward decoder is the sum of the prior information provided
zero exponentially. In order to obtain a numerically stable by the SISO multiuser detector, and the extrinsic information
algorithm, these quantities must be scaled as the computa- . The extrinsic information is the information about the
tion proceeds. Let denote the scaled version of . code bit gleaned from the prior information about the other
Initially, is computed according to (9), and we set code bits based on the trellis structure of the code.
, and , with . We can also compute the a posteriori LLR of the infor-
For each , we compute according to mation symbol bit. Let be the set of state pairs
such that the th bit of the information symbol is .
(11) Similarly define . Then we have
with (12)
(17)
Now by a simple induction we obtain
. Thus we can write as Note that the LLR’s of the information bits are only computed
at the last iteration. The information bit is then decoded
according to .
Finally, since the input to the SISO channel decoder is the
(13) LLR of the code bits, , as will be shown in the next
That is, each is effectively scaled by the sum over all section, the code bit distribution can be expressed
states of . in terms of its LLR as [cf. (27)]
Let denote the scaled version of . Initially,
is computed according to (10), and we set (18)
. For each , we compute according to
IV. SISO MULTIUSER DETECTORS
(14)
FOR SYNCHRONOUS CDMA
(20)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
1050 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 7, JULY 1999
A. SISO Multiuser Detector where (25) follows from the fact that . The first
Denote term in (26) is also independent of and will be cancelled in
(23). In (23) the a priori probabilities of the code bits can
be expressed in terms of their LLR’s , as follows.
Since , after some manipulations,
(22) we have for
Similarly define . From (21), the extrinsic information
delivered by the SISO multiuser detector [cf. (6)]
is shown in (23), at the bottom of the page, where we use
the notation . The summations in the
numerator (resp., denominator) in (23) are over all the
possible vectors in (resp., ). We have
(24)
Note that the first term in (24) is independent of and therefore
will be cancelled in (23). The third term in (24) can be written (27)
(23)
(28)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1051
(38)
Denote
(29)
(39)
where the second equality follows from (27). Define
(31)
(40)
where denotes a -vector of all zeros, except for the th
element, which is 1. Therefore, is obtained from Substituting (32) and (40) into (33), we obtain
by setting the th element to zero. For each user , a soft
interference cancellation is performed on the matched-filter (41)
output in (21), to obtain
Notice that the term in (41) is the output of a
decorrelating multiuser filter. Next we consider some special
(32)
cases of the output .
Such a soft interference cancellation scheme was first proposed 1) No prior information on the code bits of the interfering
in [8]. Next, in order to further suppress the residual interfer- users: i.e., . In this case, , and
ence in , an instantaneous linear MMSE filter is . Then (41) becomes
applied to , to obtain
(42)
(33)
where the filter is chosen to minimize the mean- which is simply the output of the linear MMSE multiuser
square error between the code bit and the filter output detector for user .
, i.e., 2) Perfect prior information on the code bits of the in-
terfering users, i.e., . In this case,
, and
. Substituting this result into (40), we
obtain
(34)
(36)
and in (35)
(44)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
1052 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 7, JULY 1999
3) In general, the prior information provided by the SISO From (47) the extrinsic information delivered by the soft
channel decoder satisfies . The instantaneous MMSE filter is then
signal-to-interference-plus-noise ratio (SINR) at the soft
instantaneous MMSE filter output is defined as
(45)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1053
Fig. 2. Performance of the Turbo multiuser receiver that employs the exact SISO multiuser detector. K = 4; ij = 0:7. All users have equal power.
Fig. 3. Performance of the Turbo multiuser receiver that employs the approximate SISO multiuser detector. K = 4; ij = 0:7. All users have equal power.
C. Simulation Results notation). Each user uses a different interleaver generated ran-
domly. The same set of interleavers is used for all simulations.
In this section, we present some simulation examples to il- The block size of the information bits for each user is 128.
lustrate the performance of the Turbo multiuser receiver in syn- First we consider a four-user system with equal cross-
chronous CDMA systems. Of particular interest is the receiver correlation , for . All the users have
that employs the low-complexity approximate SISO multiuser the same power. In Fig. 2 the performance of the Turbo
detector. All users employ the same rate constraint length receiver that employs the exact SISO multiuser detector (28)
convolutional code (with generators 23, 35 in octal is shown for the first 5 iterations. In Fig. 3, the performance
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
1054 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 7, JULY 1999
Fig. 4. Strong user performance under the Turbo multiuser receiver that employs the approximate SISO multiuser detector. K = 4; ij = 0:7. Two
users are 3 dB stronger than the other two.
Fig. 5. Weak user performance under the Turbo multiuser receiver that employs the approximate SISO multiuser detector. K = 4; ij = 0:7. Two
users are 3 dB stronger than the other two.
of the Turbo receiver that employs the approximate SISO SISO multiuser detector is small. Next we consider a near–far
multiuser detector is shown for the same channel. In each situation, where there are two equal-power strong users and
of the these figures, the single-user performance is two equal-power weak users. The strong users’ powers are 3
also shown. It is seen that the performance of both receivers dB above the weak users’. The user cross correlations remain
converges toward the single-user performance at high SNR. the same. Figs. 4 and 5 show, respectively, the performance of
Moreover, the performance loss due to using the approximate strong and weak users under the Turbo receiver that employs
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1055
Fig. 6. Performance of the Turbo multiuser receiver that employs the approximate SISO multiuser detector. K = 8; ij = 0:7. All users have equal power.
the approximate SISO multiuser detectors. It is seen that in In the direct-sequence spread-spectrum multiple-access for-
such a near–far situation, the weak users actually benefit mat, the user signaling waveforms are of the form
from the strong interference whereas the strong users suffer
performance loss from the weak interference, a phenomenon
previously also observed in the optimal multiuser detector [18] (55)
and the multistage multiuser detector [17]. Note that with a
computational complexity , the exact SISO multiuser
where is the processing gain; is a signature
detector (28) is not feasible for practical implementation in
sequence of ’s assigned to the th user, and is a
channels with medium to large number of users ; whereas
normalized chip waveform of duration . The
the approximate SISO multiuser detector has a reasonable
received signal due to the th user in (3) can then be written as
complexity that can be easily implemented even for very large
. Fig. 6 illustrates the performance of the Turbo receiver that
employs the approximate SISO multiuser detector in a eight- (56)
user system. The user cross correlations are still .
All users have the same power. Note that the performance
of such receiver after the first iteration corresponds to the where
performance of a “traditional” noniterative receiver structure
consisting of a linear MMSE multiuser detector followed by (57)
parallel (soft) channel decoders. It is seen from these figures
that at reasonably high SNR, the proposed low-complexity
iterative receiver offers significant performance gain over the Define the discrete-time channel response for the th user’s
traditional noniterative receiver. signal as
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
1056 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 7, JULY 1999
with duration , then we have By stacking successive samples of the received data vector,
we further define the following quantities:
..
.
..
where the indicator function is equal to one if event .
is true and zero, otherwise.
Let be the discrete-time composite signal wave-
form of the th user, resulting from the convolution of the ..
original spreading sequence with the total channel .
response , i.e.,
(59) .. .. .. .. ..
. . . . .
The length of the sequence is .
Denote , and . Then (61) can be written in matrix form as
For , define an matrix
(62)
.. .. .. where is a complex Gaussian noise vector of dimension
. . .
. Next we consider the exact as well as
an approximate sliding-window SISO multiuser detector based
In order to convert the continuous-time received signal on the discrete-time signal model (62).
into a discrete-time signal, at the receiver, is first filtered B. Sliding-Window SISO Multiuser Detector
by a chip-matched filter and then sampled at the chip rate.
A sliding-window multiuser detector makes decision on the
The resulting signal sample at the th chip interval of the th
th multiuser code bit vector , based on the signal .
symbol interval is given by
Denote .
Similarly define . The extrinsic information
delivered by the exact sliding-window SISO multiuser detector
(60) is given by (63), shown at the bottom of the page, where we
denote
Denote , and
. Then we can write [20]
(64)
(61) (65)
where is a complex Gaussian noise vector of dimension The number of terms to be summed in the numerator (denom-
. inator) of (63) is . Similar to what is discussed
(63)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1057
for the synchronous CDMA system, we next consider a As before, in order to form the LLR of the code bit
low-complexity approximate sliding-window SISO multiuser , we approximate the soft instantaneous MMSE filter
detector, based on soft interference cancellation and instanta- output in (70) as Gaussian distributed, i.e.,
neous linear MMSE filtering. . Conditioned on the code bit , the
mean and variance of are given respectively by
C. Low-Complexity Sliding-Window SISO Multiuser Detector
Based on the a priori LLR of the code bits of all users,
, provided by the
SISO channel decoder from the previous stage, we first form
soft estimates of the user code bits . (75)
Denote
(66)
(67) (76)
(73)
As expected, in this case is simply the input
and SNR of the th user. In general, the prior information on the
multiuser code bits provided by the SISO channel decoders
satisfy . Then it is shown in Appendix
B that
(81)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
1058 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 7, JULY 1999
TABLE I
8 H H
RECURSIVE PROCEDURE FORCOMPUTING k (i).[ (:; l) DENOTES THE l-TH COLUMN OF ]. THE DOMINANT COMPUTATION IN THE ABOVE RECURSION
0 0
INCLUDES THE (2 1)K MATRIX–VECTORPRODUCTS AND THE (2 1)K VECTOR OUTER PRODUCTS IN (?), AS WELL AS THE K
MATRIX–VECTORPRODUCTS AND K VECTOR OUTER PRODUCTS IN (??).THEREFORE, IN COMPUTING THE SOFT OUTPUT OF THE
APPROXIMATE SLIDING-WINDOW SISO MULTIUSER DETECTOR, THE DOMINANT COMPUTATION PER USER PER SYMBOL INVOLVES (2)
2
MATRIX–VECTORPRODUCTS (MATRIX DIMENSION: N N ), AND (2) VECTOR OUTER PRODUCTS (VECTOR DIMENSION: N )
TABLE II
SIMULATED MULTIPATH CDMA SYSTEM
inversion is outlined in Table I. By employing this recursion, for each user . The multipath delays are in terms of
in computing the soft output of the approximate sliding- number of chip intervals . The complex path gains for
window SISO multiuser detector, the dominant computation each user are normalized such that the composite signature
per user per symbol involves matrix-vector products sequence satisfies [cf. (59)]. As before all
(matrix dimension: ), and vector outer products users employ the same rate constraint length 5 convolutional
(vector dimension: ). The total computational complexity code. Each user uses a different random interleaver. The same
of the Turbo multiuser detector is then , where set of interleavers is used for all simulations. The block size
is the code constraint length. of the information bits for each user is 128. In the simulation,
the four user signals have equal power. The bit error rate
D. Simulation Results curves of users 1 and 2 are shown in Figs. 7 and 8. It is seen
In this section we illustrate the performance of the sliding- that significant performance gain is achieved by the proposed
window Turbo multiuser receiver that employs the approxi- iterative receiver structure compared with the noniterative
mate SISO multiuser detector in a multipath CDMA channel. receiver structure (i.e., linear MMSE demodulator followed by
We consider an asynchronous CDMA system with four users soft channel decoder). Moreover, at high SNR, the detrimental
. The user spreading sequences are derived from Gold effects of the MAI and ISI in the channel can almost be
sequences of length seven , as used in [17]. The completely eliminated and single-user performance can be
multipath channel model is given by (2). The number of paths approached. Note that similar performance gain by a Turbo
for each user is three . In Table II we list the signature equalizer in a single-user ISI channel has been previously
sequence , path delays and complex path gains reported in [4].
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1059
Fig. 7. User 1 performance of the sliding-window Turbo multiuser receiver that employs the approximate SISO multiuser detector in a four-user multipath
channel. All users have equal power. N =
7.
Fig. 8. User 2 performance of the sliding-window Turbo multiuser receiver that employs the approximate SISO multiuser detector in a four-user multipath
channel. All users have equal power. = 7.N
VI. CONCLUSION rate CDMA system, the MAI and the ISI constitute the
major impediment to the overall system performance. In
There is currently a significant interest in the design of this paper, we have developed a low-complexity iterative
wide-band CDMA networks which would give users access receiver structure for decoding multiuser information data in
to data rates on the order of 1 to 10’s of Mb/s [5], [14], or a convolutionally coded asynchronous multipath DS-CDMA
even higher ATM (asynchronous transfer mode)-compatible system. At each iteration, extrinsic information is extracted
rates for wireless multimedia applications [12]. In a high- from detection and decoding stages and is then used as a priori
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
1060 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 7, JULY 1999
information in the next iteration, just as in Turbo decoding. A . It is easy to check that
low-complexity SISO multiuser detector is developed based
on a novel nonlinear interference suppression technique, which
makes use of both soft-interference cancellation and instanta-
neous linear MMSE filtering. Simulation results demonstrate
that the proposed low-complexity Turbo multiuser receiver
offers performance approaching that of the single-user channel
at high SNR.
APPENDIX A APPENDIX B
PROOF OF (46) PROOF OF (81)
First we have the following. By (75) and (78), in order to show (81), it suffices to show
Fact: Let be a positive definite matrix. Denote that
be the matrix obtained from by
deleting the th row and th column. Denote also the th
column of with the th entry removed. Then we have (88)
This is equivalent to [10]
(82)
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.
WANG AND POOR: ITERATIVE (TURBO) SOFT INTERFERENCE CANCELLATION AND DECODING FOR CODED CDMA 1061
[17] F. Tarköy, “Iterative multiuser decoding for asynchronous users,” in H. Vincent Poor (S’72–M’77–SM’82–F’87)
Proc. 1997 IEEE Int. Symp. on Inform. Theory (ISIT’97), Ulm, Germany, received the Ph.D. degree in electrical engineering
June 1997, p. 30. and computer science from Princeton University,
[18] M. K. Varanasi and B. Aazhang, “Near-optimum detection in syn- Princeton, NJ, in 1977.
chronous code-division multiple-access systems,” IEEE Trans. Com- He is currently a Professor of electrical
mun., vol. 39, pp. 725–736, May 1991. engineering at Princeton. From 1977 until he joined
[19] S. Verdú, “Minimum probability of error for asynchronous Gaussian the Princeton faculty in 1990, he was a faculty
multiple-access channels,” IEEE Trans. Inform. Theory, vol. IT-32, pp. member at the University of Illinois. He has also
85–96, Jan. 1986. held visiting and summer appointments at several
[20] S. Verdú, Multiuser Detection, Cambridge, U.K.: Cambridge Univ. universities and research organizations in the U.S.,
Press, 1998. Great Britain, and Australia. His research interests
[21] X. Wang and H. V. Poor, “Blind equalization and multiuser detection for are in the area of statistical signal processing and its applications, primarily
CDMA communications in dispersive channels,” IEEE Trans. Commun., in wireless communications. His publications in this area include Wireless
vol. 46, pp. 91–103, Jan. 1998. Communications: Signal Processing Perspectives (Englewood Cliffs, NJ:
Prentice Hall, 1998) co-edited with G. Wornell.
Dr. Poor is a Fellow of the Acoustical Society of America and of the
American Association of the Advancement of Science. He has been involved
Xiaodong Wang (S’98–M’98) received the B.S. in a number of IEEE activities, including serving as President of the IEEE
degree in electrical engineering and applied math- Information Theory Society in 1990 and as a member of the IEEE Board of
ematics (with highest honors) from Shanghai Jiao Directors in 1991 and 1992. In 1992, he received the Terman Award from the
Tong University, Shanghai, China, in 1992; the American Society for Engineering Education, and in 1994 he received the
M.S.E.E. degree from Purdue University in 1995, Distinguished Member Award from the IEEE Control Systems Society.
and the Ph.D. degree in electrical engineering from
Princeton University in 1998. In July 1998 he joined
the Department of Electrical Engineering, Texas
A&M University, as an Assistant Professor.
His research interests are in the areas of com-
puting, signal processing and communications. He
has worked in the areas of digital communications, digital signal processing,
parallel and distributed computing, nanoelectronics and quantum computing.
His current research focuses primarily on multiuser communication theory
and advanced signal processing for wireless communications.
Dr. Wang has received the 1999 NSF CAREER Award.
Authorized licensed use limited to: Stanford University. Downloaded on January 25, 2010 at 23:29 from IEEE Xplore. Restrictions apply.