Professional Documents
Culture Documents
*
N-I N-1
=[ ~ x ( ~ ) x " ( ~ ) l ' A [ ~ b l ( n ) x ( n ) l (7)
n=a "dl
IV - 446
=C,(r)gk (14)
Detector
Estimation g, = [ g k ( O ) . . . . , g k ( P - l ) l T (15)
ck(rL) ... ck(rL-P+l)
x(O)...r(N - 1 ) C,(r) = ... ... ] ( 1 6 )
c, ( ( I + 1)L- 1 ) ... ck((r+l)L- P )
Then we have
Symbol
Estimation Rw, = RC,(O)g, (17)
Let D he an L x ( L - P ) matrix that spans null column
subspace of C,(O) , i.e., D H C I ( 0 ) = O. Construct a
Fig.2. A new iterative algorithm
matrix E H =I 1
L
I 0... a
DH .
J
Left multiply EH to both
4. LINEAR MMSE CONSTRAINT
sides of eq. (13), then we have
An efficient constraint technique should guarantee that the EHRw,=EHA,CI(0)gl
global optimal associated with the desired user will locate
=A*[cl(O)g,(O) 0 ... 01' (18)
in the constrained searching space. At the same time the
interference solutions should be excluded from the Let G =(~,(O)g~(O))-'(notethat Ig,(O)I>O), wehave
constrained searching space. The constraint applied in [4]
(similar formulation in [ 2 ] )is
E ~ R ~ , = [0 I ... 01' (1%
Let FH = EHR , we have a new constraint having same
wHC,(O) =U; (11) formulation as (9)
where Cl(0) is constructed from the desired user's
wIH F = [ l 0 01 .I.
(20)
spreading code, and ud is restricted to
It is straightforward that the optimal solution of (12)
u,=[O...O ! 0,..0]''.Notethatin(lI) ud isforced must satisfy the proposed new linear constraint of (ZO),
d which means the constrained space by (20) must contain
to ud =[0...0 A 0...0]', but in fact it does not have the global MMSE solution. Therefore the proposed
algorithm can achieve global optimality in theory.
d
such formulation, and therefore the constrained searching Eq. (20) differs from (1 1) in that the spreading code as
space by (11) may not contain the real optimal w, [ 2 ] . well as the channel properties are included in (20),
whereas (11) cannot reflect the effect of channel
Furthermore, the effect of channel variation has not been
parameters and consequently the constraint of (1 1 ) does
considered in (1 1).
not hold in practice. One may argue that interference
In the following part we propose a new constraint taking
optimal may also locate in the Constrained searching space
into account the desire user's spreading code as well as the
channel properties. It is straightforward that the optimal by (20). W e shall show that it depends on the spreading
codes. Optimal selection of spreading codes is beyond the
MMSE detector w* satisfies the following
scope of this paper and we leave it to future work.
Rw, = Rp (12)
where R = E[x(n)xH( n ) ] denotes the autocorrelation 5. COMPUTATION SIMULATIONS
matrix, and p = E[x(n)b, ( n ) ] denotes the inter-comela- Computer simulations are presented to illustrate the
tion vector. When the user symbols are i.i.d. we have efficiency of our approach. We consider an asynchronous
P = E[x(n)bl (n)l DS-CDMA communication system with K users
K transmitting BPSK symbols. The processing gain is
= E 1 ~ [ D k b k ( n ) l b l ( n+E(n)bl(n)l
) L = 16 . The spreading sequences of all users are
k=l generated randomly. The length of the discrete-time
=di(O)= Ci (0)gi (13) equivalent channel response for each user is P = 4 . We
where consider a Rayleigh channel model where the channel
coefficients h k ( p ) ( k = l , . . . , K , p = O , . . . , P - l ) are
complex random variables with statistically independent
d, ( 7 )=
real and imaginary parts. Both the real part and imaginary
part are Gaussian with zero mean and standard deviation
IV - 447
oh= 0.3. In order to estimate the aymbul error rate (SER), 141 MBca F. Bugallo, Joaquin Miguez and Luis Castedo, “A
maximum likelihood approach to blind multiuser interferen-
the simulation results are averaged over IS0 randomly ce cancellation,” IEEE Tram. Signal processing, vol. 49, no.
generated channels. For each channel a block of data with 6, pp. 1228-1239. June 2001.
length N = 300 is transmitted and SO0 independent trials 151 M. F. Bagallo, J. Miguez, and L. Castedo, “Semiblind linear
are done. Symbol error rate (SER) is adopted to measure muliuser interference cancellation: a maximum likelihood
the performance. In our iterative approach, %, ;b are approach,” IEEE Trans. Signal Processing, vol. 81, no. 4,
pp. 2041-2057, April 2001
initializedto iU, ,, =[IIP,...,IIP] and b = l .
100 t.. ..~. .* . .* . . ~... .,...
We compare the performance of the proposed .... ................
.................... ......... . .
~
6. CONCLUSION
6
-
10
idealMMSE
12 14 16
multipath channels. This blind multiuser detector is based
on MMSE criterion and the proposed new linear constraint No. of users
coincides with MMSE criterion. Simulation results Fig.4. SER versus the number of users in a DS-
demonstrate the effectiveness of the proposed techniques. CDMA system with SNR=12dB
7.ACKNOWLEDGEMENTS
8. REFERENCES
[ I ] S. Verd6, MuWuser Detection, Cambridge, U.K.: Cambridge
Univ. Press, 1998.
[2] M. K. Tsatsanis, “Inverse filtering criteria for CDMA
systems,”IEEE Trans. Signal Processing,vol. 45, no. 1, pp.
102-122,Jan.1997.
131 M. K. Tsatsanis and Z . Xu, “Performance analysis of No. of iterations
minimum variance CDMA receivers,” IEEE Trans. Signal Fig.5. MSE versus the number of iteration in a DS-
Processing, vol. 46, no. 11, pp. 3014-3022, Nov. 1998. CDMA system with K = 7 users and SNR=IZdB
IV - 448