2.4 Blind Multiuser Detection: Subspace Methods


2.4 Blind Multiuser Detection: Subspace Methods

In this section we discuss another approach to blind multiuser detection, which was first developed in [549] and is based on estimating the signal subspace spanned by the user signature waveforms. This approach leads to blind implementation of both the linear decorrelating detector and the linear MMSE detector. It also offers a number of advantages over the direct methods discussed in Section 2.3.

Assume that the spreading waveforms graphics/041fig01.gif of K users are linearly independent. Note that C r of (2.27) is the sum of the rank- K matrix S A 2 S H and the identity matrix s 2 I N . This matrix then has K eigenvalues that are strictly larger than s 2 and ( N - K ) eigenvalues that equal s 2 . Its eigendecomposition can be written as

Equation 2.72

graphics/02equ072.gif


where L s = diag ( l 1 , ..., l K ) contains the largest K eigenvalues of C r , U s = [ u 1 , ..., u K ] contains the K orthogonal eigenvectors corresponding to the largest K eigenvalues in L s ; and U n = [ u K + 1 , ..., u N ] contains the ( N - K ) orthogonal eigenvectors corresponding to the smallest eigenvalue s 2 of C r . It is easy to see that range ( S ) = range ( U s ). The column space of U s is called the signal subspace and its orthogonal complement, the noise subspace , is spanned by the columns of U n . We next derive expressions for the linear decorrelating detector and the linear MMSE detector in terms of the signal subspace parameters U s , L s , and s 2 .

2.4.1 Linear Decorrelating Detector

The linear decorrelating detector given by (2.13) is characterized by the following results.

Lemma 2.1: The linear decorrelating detector d 1 in (2.13) is the unique weight vector w range ( U s ), such that w H s 1 = 1, and w H s k = 0 for k = 2, ..., K .

Proof: Since rank ( U s ) = K , the vector w that satisfies the foregoing conditions exists and is unique. Moreover, these conditions have been verified in the proof of Proposition 1 in Section 2.2.2.

Lemma 2.2: The decorrelating detector d 1 in (2.13) is the unique weight vector w range ( U s ) that minimizes graphics/041fig02.gif subject to w H s 1 = 1.

Proof: Since

Equation 2.73

graphics/02equ073.gif


it then follows that for w range ( U s ) = range ( s ), f ( w ) is minimized if and only if w H s k = 0 for k = 2, ..., K . By Lemma 2.1 the unique solution is w = d 1 .

Proposition 2.3: The linear decorrelating detector d 1 in (2.13) is given in terms of the signal subspace parameters by

Equation 2.74

graphics/02equ074.gif


with

Equation 2.75

graphics/02equ075.gif


Proof: A vector w range ( U s ) if and only if it can be written as w = U s x , for some graphics/042fig01.gif . Then by Lemma 2.2 the linear decorrelating detector d 1 has the form d 1 = U s x 1 , where

Equation 2.76

graphics/02equ076.gif


where the third equality follows from the fact that

graphics/042equ01.gif


which in turn follows directly from (2.27) and (2.72). The optimization problem (2.76) can be solved by the method of Lagrange multipliers. Let

graphics/042equ02.gif


Since the matrix L s - s 2 I K is positive definite, L ( x ) is a strictly convex function of x . Therefore, the unique global minimum of L ( x ) is achieved at x 1 , where L ( x 1 ) = 0, or

Equation 2.77

graphics/02equ077.gif


Therefore, graphics/043fig01.gif , where a d is determined from the constraint ( U s x 1 ) H s 1 = 1; that is, graphics/043fig02.gif . Finally, the weight vector of the linear decorrelating detector is given by graphics/043fig03.gif .

2.4.2 Linear MMSE Detector

The following result gives the subspace form of the linear MMSE detector, defined by (2.32).

Proposition 2.4: The weight vector m 1 of the linear MMSE detector defined by (2.32) is given in terms of the signal subspace parameters by

Equation 2.78

graphics/02equ078.gif


with

Equation 2.79

graphics/02equ079.gif


Proof: From (2.34) the linear MMSE detector defined by (2.32) is given by

Equation 2.80

graphics/02equ080.gif


By (2.72),

Equation 2.81

graphics/02equ081.gif


Substituting (2.81) into (2.80) and using the fact that graphics/043fig04.gif , we obtain (2.78).

Since the decision rules (2.7) and (2.9) are invariant to a positive scaling, the two subspace linear multiuser detectors given by (2.74) and (2.78) can be interpreted as follows. First, the received signal r [ i ] is projected onto the signal subspace to get graphics/043fig05.gif , which clearly is a sufficient statistic for demodulating the K users' data bits. The spreading waveform s 1 of the desired user is also projected onto the signal subspace to obtain graphics/043fig11.gif . The projection of the linear multiuser detector in the signal subspace is then a signal graphics/043fig07.gif such that the detector output is graphics/043fig08.gif the data bit is demodulated as graphics/043fig09.gif for coherent detection, and graphics/043fig10.gif for differential detection. According to (2.74) and (2.78), the projections of the linear decorrelating detector and that of the linear MMSE detector in the signal subspace are given, respectively, by

Equation 2.82

graphics/02equ082.gif


Equation 2.83

graphics/02equ083.gif


Therefore, the projection of the linear multiuser detectors in the signal subspace is obtained by projecting the spreading waveform of the desired user onto the signal subspace, followed by scaling the k th component of this projection by a factor of ( l k - s 2 ) -1 (for linear decorrelating detector) or graphics/044fig01.gif (for linear MMSE detector). Note that as s 2 0, the two linear detectors become identical, as we would expect.

Since the autocorrelation matrix C r , and therefore its eigencomponents, can be estimated from the received signals, from the discussion above we see that both the linear decorrelating detector and the linear MMSE detector can be estimated from the received signal with the prior knowledge of only the spreading waveform and the timing of the desired user (i.e., they both can be obtained blindly). We summarize the subspace blind multiuser detection algorithm as follows.

Algorithm 2.5: [Subspace blind linear detector ”synchronous CDMA]

  • Compute the detector:

Equation 2.84

graphics/02equ084.gif


Equation 2.85

graphics/02equ085.gif


Equation 2.86

graphics/02equ086.gif


Equation 2.87

graphics/02equ087.gif


  • Perform differential detection:

Equation 2.88

graphics/02equ088.gif


Equation 2.89

graphics/02equ089.gif


2.4.3 Asymptotics of Detector Estimates

We next examine the consistency and asymptotic variance of the estimates of the two subspace linear detectors. Assuming that the received signal samples are independent and identically distributed (i.i.d.), then by the strong law of large numbers , the sample mean graphics/045fig01.gif converges to C r almost surely (a.s.) as the number of received signals M . It then follows [521] that as graphics/045fig02.gif a.s., for k = 1, ..., K . Therefore, we have

Equation 2.90

graphics/02equ090.gif


Equation 2.91

graphics/02equ091.gif


Similarly, graphics/045fig03.gif a.s. as M . Hence both the estimated subspace linear multiuser detectors based on the received signals are strongly consistent . However, it is in general biased for finite number of samples. We next consider an asymptotic bound on the estimation errors.

First, for all eigenvalues and the K largest eigenvectors of graphics/045fig01.gif , the following bounds hold a.s. [521, 609]:

Equation 2.92

graphics/02equ092.gif


Equation 2.93

graphics/02equ093.gif


Using the bounds above, we have

Equation 2.94

graphics/02equ094.gif


Note that graphics/045fig04.gif , graphics/045fig05.gif , and graphics/045fig06.gif are all bounded. On the other hand, it is easily seen that

Equation 2.95

graphics/02equ095.gif


Equation 2.96

graphics/02equ096.gif


Therefore, we obtain the asymptotic estimation error for the linear MMSE detector, and similarly that for the decorrelating detector, given, respectively, by

graphics/046equ01.gif


2.4.4 Asymptotic Multiuser Efficiency under Mismatch

We now consider the effect of spreading waveform mismatch on the performance of subspace linear multiuser detectors. Let graphics/046fig01.gif with graphics/046fig02.gif be the assumed spreading waveform of the desired user and s 1 be the true spreading waveform of that user. graphics/046fig01.gif can then be decomposed into components of the signal subspace and the noise subspace; that is,

Equation 2.97

graphics/02equ097.gif


with

Equation 2.98

graphics/02equ098.gif


Equation 2.99

graphics/02equ099.gif


For simplicity, in the following we consider the real-valued signal model [i.e., A k > 0, k = 1, ..., K , and n [ i ] ~ N ( , s 2 I N )]. [Here N ( ·, ·) denotes a real-valued Gaussian distribution.] The signal subspace component graphics/046fig03.gif can then be written as

Equation 2.100

graphics/02equ100.gif


for some graphics/046fig04.gif with a 1 > 0. A commonly used performance measure for a multiuser detector is the asymptotic multiuser efficiency (AME) [520], defined as [2]

[2] P 1 ( s ) is the probability of error of the detector for noise level s ; graphics/046fig05.gif .

Equation 2.101

graphics/02equ101.gif


which measures the exponential decay rate of the error probability as the background noise approaches zero relative to that of a single-user system having the same signal-to-noise ratio. A related performance measure, the near “far resistance , is the infimum of AME as the interferers' energies are allowed to vary arbitrarily.

Equation 2.102

graphics/02equ102.gif


Since as s 0, the linear decorrelating detector and the linear MMSE detector become identical, these two detectors have the same AME and near “far resistance [296, 307]. It is straightforward to compute the AME of the linear decorrelating detector, since its output consists of only the desired user's signal and the ambient Gaussian noise. By (2.15) “(2.17), we conclude that the AME and the near “far resistance of both linear detectors are given by

Equation 2.103

graphics/02equ103.gif


Next we compute the AME and the near “far resistance of the two subspace linear detectors under spreading waveform mismatch. Define the N x N diagonal matrices

Equation 2.104

graphics/02equ104.gif


Equation 2.105

graphics/02equ105.gif


Denote the singular value decomposition (SVD) of S by

Equation 2.106

graphics/02equ106.gif


where the N x K matrix G = [ g ij ] has g ij = 0 for all i j and g 11 g 22 ... g KK . The columns of the N x N matrix W are the orthogonal eigenvectors of s s T , and the columns of the K x K matrix V are the orthogonal eigenvectors of R = S T S . We have the following result, whose proof is given in the Appendix (Section 2.8.2).

Lemma 2.3: Let the eigendecomposition of C r be C r = U L U T . Then the N x N diagonal matrix graphics/047equ01.gif in (2.105) is given by

Equation 2.107

graphics/02equ107.gif


where G is the transpose of G in which the singular values are replaced by their reciprocals.

Using the result above, we obtain the AME of the subspace linear detectors under spreading waveform mismatch, as follows.

Proposition 2.5: The AME of the subspace linear decorrelating detector given by (2.74) and that of the subspace linear MMSE detector given by (2.78) under spreading waveform mismatch is given by

Equation 2.108

graphics/02equ108.gif


Proof: Since d 1 and m 1 have the same AME, we need only to compute the AME for d 1 . Because a positive scaling on the detector does not affect its AME, we consider the AME of the following scaled version of d 1 under the signature waveform mismatch:

Equation 2.109

graphics/02equ109.gif


where the second equality follows from the fact that the noise subspace component graphics/048fig01.gif is orthogonal to the signal subspace U s . Substituting (2.106) and (2.107) into (2.109), we have

Equation 2.110

graphics/02equ110.gif


Equation 2.111

graphics/02equ111.gif


Equation 2.112

graphics/02equ112.gif


The output of the detector graphics/048fig02.gif is given by

Equation 2.113

graphics/02equ113.gif


where graphics/048fig03.gif . The probability of error for user 1 is then given by

Equation 2.114

graphics/02equ114.gif


It then follows that the AME is given by (2.108).

It is seen from (2.114) that spreading waveform mismatch causes MAI leakage at the detector output. Strong interferers ( A k >> A 1 ) are suppressed at the output, whereas weak interferers ( A k << A 1 ) may lead to performance degradation. If the mismatch is not significant, with power control, so that the open -eye condition is satisfied (i.e., graphics/048fig04.gif ), the performance loss is negligible; otherwise , the effective spreading waveform should be estimated first. Moreover, since the mismatched spreading waveform graphics/049fig01.gif is first projected onto the signal subspace, its noise subspace component graphics/049fig02.gif is nulled out and does not cause performance degradation; whereas for the blind adaptive MOE detector discussed in Section 2.3, such a noise subspace component may lead to complete cancellation of both the signal and MAI if there is no energy constraint on the detector [183].



Wireless Communication Systems
Wireless Communication Systems: Advanced Techniques for Signal Reception (paperback)
ISBN: 0137020805
EAN: 2147483647
Year: 2003
Pages: 91

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net