2.7 Blind Multiuser Detection in Multipath Channels


In previous sections we focused on the synchronous CDMA signal model. In a practical wireless CDMA system, however, the users' signals are asynchronous. Moreover, the physical channel exhibits dispersion due to multipath effects that further distort the signals. In this section we address blind multiuser detection in such channels. As will be seen, the principal techniques developed in previous sections can be applied to this more realistic situation as well.

2.7.1 Multipath Signal Model

We now consider a more general multiple-access signal model where the users are asynchronous, and the channel exhibits multipath distortion effects. In particular, the multipath channel impulse response of the k th user is modeled as in (1.10):

Equation 2.165

graphics/02equ165.gif


where L is the total number of paths in the channel, and a l,k and t l,k are, respectively, the complex path gain and the delay of the k th user's l th path, t 1, k < t 2, k < · · · < t L,k . The continuous-time signal received in this case is given by

Equation 2.166

graphics/02equ166.gif


where * denotes convolution and s k (t) is the spreading waveform of the k th user given by (2.2).

At the receiver, the received signal r(t) is filtered by a chip-matched filter and sampled at a multiple (p) of the chip rate (i.e., the sampling time interval is D = T c /p = T/P , where graphics/071fig01.gif is the total number of samples per symbol interval). Let

graphics/071equ02.gif


be the maximum delay spread in terms of symbol intervals. Substituting (2.2) into (2.166), the q th signal sample during the i th symbol interval is given by!

Equation 2.167

graphics/02equ167.gif


where graphics/072fig01.gif . Denote

graphics/072fig02.gif


Then (2.167) can be written in terms of vector convolution as

Equation 2.168

graphics/02equ168.gif


By stacking m successive sample vectors, we further define the following quantities :

graphics/073equ01.gif


where the smoothing factor m is chosen according to graphics/073fig02.gif . Note that for such m , the matrix H is a "tall" matrix [i.e., Pm K(m + I ) ]. We can then write (2.168) in matrix form as

Equation 2.169

graphics/02equ169.gif


2.7.2 Linear Multiuser Detectors

Suppose that we are interested in demodulating the data of user 1. Then (2.168) can be written as

Equation 2.170

graphics/02equ170.gif


where graphics/073fig03.gif denotes the k th column of graphics/073fig04.gif . In (2.170), the first term contains the data bit of the desired user at time i ; the second term contains the previous data bits of the desired user [i.e., we have intersymbol interference (ISI)]; and the last term contains the signals from other users [i.e., multiple-access interference (MAI)]. Hence, compared with the synchronous model considered in previous sections, the multipath channel introduces ISI, which together with MAI must be contended with at the receiver. Moreover, the augmented signal model (2.169) is very similar to the synchronous signal model (2.5). We proceed to develop linear receivers for this system.

A linear receiver for this purpose can be represented by a Pm dimensional complex vector graphics/073fig05.gif , which is correlated with the received signal r [ i ] in (2.169) to obtain

Equation 2.171

graphics/02equ171.gif


The coherent detection rule is then given by

Equation 2.172

graphics/02equ172.gif


and the differential detection rule is given by

Equation 2.173

graphics/02equ173.gif


As before, two forms of such linear detectors are the linear decorrelating detector and the linear minimum mean-square-error (MMSE) detector, which are described next .

Linear Decorrelating Detector

The linear decorrelating detector for user 1 has the form of (2.171) “(2.173) with the weight vector w 1 = d 1 , such that both the multiple-access interference (MAI) and the intersymbol interference (ISI) are eliminated completely at the detector output. [3]

[3] In the context of equalization, this detector is known as a zero-forcing equalizer , as noted in Chapter 1.

Denote by e l the K ( m + I )-vector with all-zero entries except for the l th entry, which is 1. Recall that the smoothing factor m is chosen such that the matrix H in (2.169) is a tall matrix. Assume that H has full column rank [i.e., graphics/074equ01.gif ]. Let H be the Moore “Penrose generalized inverse of the matrix H :

Equation 2.174

graphics/02equ174.gif


The linear decorrelating detector for user 1 is then given by

Equation 2.175

graphics/02equ175.gif


Using (2.169) and (2.175), we have

Equation 2.176

graphics/02equ176.gif


It is seen from (2.176) that both the MAI and the ISI are eliminated completely at the output of the linear zero-forcing detector. In the absence of noise (i.e., n [ i ] = ), the data bit of the desired user, b 1 [ i ], is recovered perfectly .

Linear MMSE Detector

The linear minimum mean-square-error (MMSE) detector for user 1 has the form of (2.171) “(2.173) with the weight vector w 1 = m 1 , where graphics/074fig02.gif is chosen to minimize the output mean-square error (MSE):

Equation 2.177

graphics/02equ177.gif


where

Equation 2.178

graphics/02equ178.gif


Equation 2.179

graphics/02equ179.gif


Subspace Linear Detectors

Let l 1 l 2 · · · l Pm be the eigenvalues of C r in (2.178). Since the matrix H has full column rank graphics/075equ01.gif the signal component of the covariance matrix C r (i.e., H H H ) has rank r . Therefore, we have

graphics/075equ02.gif


By performing an eigendecomposition of the matrix C r , we obtain

Equation 2.180

graphics/02equ180.gif


where L s = diag ( l 1 , ..., l r ) contains the r largest eigenvalues of C r in descending order, U s = [ u 1 · · · u r ] contains the corresponding orthogonal eigenvectors, and U n = [ u r +1 · · · u Pm ] contains the Pm-r orthogonal eigenvectors that correspond to the eigenvalue s 2 . It is easy to see that range ( H ) = range ( U s ). As before, the column space of U s is called the signal subspace and its orthogonal complement, the noise subspace , is spanned by the columns of U n .

Following exactly the same line of development as in the synchronous case, it can be shown that the linear decorrelating detector given by (2.175), and the linear MMSE detector given by (2.177), can be expressed in terms of the signal subspace components above as [548]

Equation 2.181

graphics/02equ181.gif


Equation 2.182

graphics/02equ182.gif


Decimation-Combining Linear Detectors

The linear detectors discussed above operate in a Pm -dimensional vector space. As will be seen in the next section, the major computation in channel estimation involves computing the singular value decomposition (SVD) of the autocorrelation matrix C r of dimensions Pm x Pm , which has computational complexity graphics/075equ03.gif . By down-sampling the received signal sample vector r [ i ] by a factor of p , it is possible to construct the linear detectors in an Nm -dimensional space and to reduce the total computational complexity of channel estimation by a factor of graphics/075equ04.gif . (Recall that p is the chip oversampling factor.) This technique is described next.

For q = 0, ..., p - 1, denote

graphics/076equ01.gif


Similar to what we did before, we can write

Equation 2.183

graphics/02equ183.gif


Assume that N m K(m+ I ) (i.e., the matrix H q is a tall matrix), and rank ( H q ) = K ( m + I ) (i.e., H q has full column rank). For each down-sampled received signal r q [ i ], the corresponding weight vectors for user 1's linear decorrelating detector and the linear MMSE detector are given, respectively, by

Equation 2.184

graphics/02equ184.gif


Equation 2.185

graphics/02equ185.gif


where graphics/076fig02.gif . By computing the subspace components of the autocorrelation matrix C q , subspace versions of the linear detectors above can be constructed in forms similar to (2.181) and (2.182).

To detect user 1's data bits, each down-sampled signal vector r q [ i ] is correlated with the corresponding weight vector to obtain

Equation 2.186

graphics/02equ186.gif


The data bits are then demodulated according to

Equation 2.187

graphics/02equ187.gif


Equation 2.188

graphics/02equ188.gif


In the decimation-combining approach described above, since the signal vectors have dimension Nm , the complexity of estimating each decimated channel response h k,q , q = 0, ..., p “1, is graphics/077equ01.gif . Hence the total complexity of channel estimation is graphics/077fig02.gif [i.e., a reduction of graphics/077fig03.gif is achieved compared with the Pm -dimensional detectors]. However, the number of users that can be supported by this receiver structure is reduced by a factor of p . That is, for a given smoothing factor m , the number of users that can be accommodated by the Pm -dimensional detector is graphics/077fig04.gif , whereas by forming p Nm -dimensional detectors and then combining their outputs, the number of users that can be supported is reduced to graphics/077fig05.gif .

2.7.3 Blind Channel Estimation

It is seen from the discussion above that unlike the synchronous case, where the linear detectors can be written in closed form once the signal subspace components are identified, in multipath channels the composite channel response vector of the desired user, graphics/077fig06.gif is needed to form the blind detector. This vector can be viewed as the channel- distorted original spreading waveform s 1 . The multipath channel can be estimated by transmitting a training sequence [32, 64, 112, 442, 581, 612]. Alternatively, the channel can be estimated blindly by exploiting the orthogonality between the signal and noise subspaces [31, 272, 484, 548, 551]. We next address the problem of blind channel estimation. From (2.167),

Equation 2.189

graphics/02equ189.gif


with

Equation 2.190

graphics/02equ190.gif


where p µ is the length of the channel response { f k [ m ]},which satisfies

Equation 2.191

graphics/02equ191.gif


Decimate h k [ n ] into p subsequences as

Equation 2.192

graphics/02equ192.gif


Note that the sequences f k,q [ m ] are obtained by down-sampling the sequence { f k [ m ]} by a factor of p :

Equation 2.193

graphics/02equ193.gif


From (2.192), we have

Equation 2.194

graphics/02equ194.gif


Denote

graphics/078equ01.gif


Then (2.194) can be written in matrix form as

Equation 2.195

graphics/02equ195.gif


Finally, denote

graphics/078equ02.gif


Then we have

Equation 2.196

graphics/02equ196.gif


where graphics/079equ01.gif matrix formed from the signature waveform of the k th user. For instance, when the oversampling factor p = 2, we have

graphics/079equ02.gif


For other values of p , the matrix graphics/079equ03.gif is constructed similarly.

Recall that when the ambient channel noise is white, through an eigendecomposition on the autocorrelation matrix of the received signal [cf. (2.180)], the signal subspace and the noise subspace can be identified. The channel response f k can then be estimated by exploiting the orthogonality between the signal subspace and the noise subspace [31, 272, 484, 548]. Specifically, since U n is orthogonal to the column space of H and graphics/079equ04.gif is in the column space of H [cf. (2.179)], we have

Equation 2.197

graphics/02equ197.gif


where

Equation 2.198

graphics/02equ198.gif


Based on the relationship above, we can obtain an estimate of the channel response f k by computing the minimum eigenvector of the matrix graphics/080fig01.gif . The condition for the channel estimate obtained in such a way to be unique is that the matrix graphics/080fig02.gif has rank p µ - 1, which necessitates that this matrix be tall (i.e., [ Pm - K ( m + I )] p µ k ). Since µ I N [cf. (2.191)], we therefore choose the smoothing factor m to satisfy

Equation 2.199

graphics/02equ199.gif


That is, graphics/080fig04.gif . On the other hand, the condition (2.199) implies that for fixed m , the total number of users that can be accommodated in the system is graphics/080fig05.gif

Finally, we summarize the batch algorithm for blind linear multiuser detection in multipath CDMA channels as follows .

Algorithm 2.7: [Subspace blind linear multiuser detector ”multipath CDMA]

  • Estimate the signal subspace:

Equation 2.200

graphics/02equ200.gif


Equation 2.201

graphics/02equ201.gif


  • Estimate the channel and form the detector:

Equation 2.202

graphics/02equ202.gif


Equation 2.203

graphics/02equ203.gif


Equation 2.204

graphics/02equ204.gif


Equation 2.205

graphics/02equ205.gif


  • Perform differential detection:

Equation 2.206

graphics/02equ206.gif


Equation 2.207

graphics/02equ207.gif


Alternatively, if the linear receiver has the decimation-combining structure, the noise subspace U n,q is computed for each q = 0, ..., p - 1. The corresponding channel response f k,q can then be estimated from the orthogonality relationship

Equation 2.208

graphics/02equ208.gif


Simulation Examples

The simulated system is an asynchronous CDMA system with processing gain N = 15. The m -sequences of length 15 and their shifted versions are employed as the user spreading sequences. The chip pulse is a raised cosine pulse with roll-off factor 0.5. Each user's channel has L = 3 paths. The delay of each path t l,k is uniformly distributed on [0, 10 T c ]. Hence the maximum delay spread is one symbol interval (i.e., I = 1). The fading gain of each path in each user's channel is generated from a complex Gaussian distribution and is fixed over the duration of one signal frame. The path gains in each user's channel are normalized so that all users' signals arrive at the receiver with the same power. The oversampling factor is p = 2. The smoothing factor is m = 2. Hence this system can accommodate up to graphics/081fig01.gif users. If the decimation-combining receiver structure is employed, the maximum number of users is graphics/081fig02.gif . The length of each user's signal frame is M = 200.

We first consider a five-user system. For the Pm -dimensional implementations , the bit error rates of a particular user incurred by the exact linear MMSE detector, the exact linear zero-forcing detector and the estimated linear MMSE detector are plotted in Fig. 2.13. The bit-error rates of the same user incurred by the three detectors using the decimation-combining structure are plotted in Fig. 2.14. It is seen that for the exact linear zero-forcing and linear MMSE detectors, the performance under the two structures is identical. For the blind linear MMSE receiver, the Pm -dimensional detector achieves an approximately 1-dB performance gain over the decimation-combining detector for SNR in the range 4 to 12 dB. Another observation is that the blind linear MMSE detector tends to exhibit an error floor at high SNR. This is due to the finite length of the signal frame, from which the detector is estimated. Next, a 10-user system is simulated using the Pm -dimensional detectors. The performance of the same user by the three detectors is plotted in Fig. 2.15.

Figure 2.13. Performance of Pm -dimensional linear detectors in a five-user system with white noise.

graphics/02fig13.gif

Figure 2.14. Performance of decimation-combining linear detectors in a five-user system with white noise.

graphics/02fig14.gif

Figure 2.15. Performance of Pm -dimensional linear detectors in a 10-user system with white noise.

graphics/02fig15.gif

2.7.4 Adaptive Receiver Structures

We next consider adaptive algorithms for sequentially estimating the blind linear detector. First, we address adaptive implementation of the blind channel estimator discussed above. Suppose that the signal subspace U s is known. Denote by z [ i ] the projection of the received signal r [ i ] onto the noise subspace:

Equation 2.209

graphics/02equ209.gif


Equation 2.210

graphics/02equ210.gif


Since z [ i ] lies in the noise subspace, it is orthogonal to any signal in the signal subspace. In particular, it is orthogonal to graphics/082fig01.gif . Hence f 1 is the solution to the following constrained optimization problem:

Equation 2.211

graphics/02equ211.gif


In order to obtain a sequential algorithm to solve the optimization problem above, we write it in the following (trivial) state-space form:

graphics/083equ01.gif


The standard Kalman filter can then be applied to the system above, as follows (we define graphics/083fig02.gif

Equation 2.212

graphics/02equ212.gif


Equation 2.213

graphics/02equ213.gif


Equation 2.214

graphics/02equ214.gif


Note that (2.213) contains a normalization step to satisfy the constraint f 1 [ i ] = 1.

Since the subspace blind detector may be written in closed form as a function of the signal subspace components, one may use a suitable subspace tracking algorithm in conjuction with this detector and a channel estimator to form an adaptive detector that is able to track changes in the number of users and their composite signature waveforms. Figure 2.16 contains a block diagram of such a receiver. The received signal r [ i ] is fed into a subspace tracker that sequentially estimates the signal subspace components ( U s , L s ). The signal r [ i ] is then projected onto the noise subspace to obtain z [ i ], which is in turn passed through a linear filter that is determined by the signature sequence of the desired user. The output of this filter is fed into a channel tracker that estimates the channel state of the desired user. Finally, the linear MMSE detector is constructed in closed form based on the estimated signal subspace components and the channel state. The adaptive receiver algorithm is summarized as follows. Suppose that at time ( i - 1), the estimated signal subspace rank is r [ i - 1] and the components are U s [ i - 1], L s [ i - 1], and s 2 [ i - 1]. The estimated channel vector is f 1 [ i - 1]. Then at time i , the adaptive detector performs the following steps to update the detector and estimate the data.

Figure 2.16. Blind adaptive multiuser receiver for multipath CDMA systems.

graphics/02fig16.gif

Algorithm 2.8: [Adaptive blind linear multiuser detector based on subspace tracking ”multipath CDMA]

  • Update the signal subspace: Use a particular signal subspace tracking algorithm to update the signal subspace rank r[ i ] and the subspace components U s [ i ] and L s [ i ].

  • Update the channel: Use (2.212) “(2.214) to update the channel estimate f 1 [ i ].

  • Form the detector and perform differential detection:

Equation 2.215

graphics/02equ215.gif


Equation 2.216

graphics/02equ216.gif


Equation 2.217

graphics/02equ217.gif


Simulation Example

We next give a simulation example illustrating the performance of the blind adaptive receiver in an asynchronous CDMA system with multipath channels. The processing gain N = 15 and the spreading codes are Gold codes of length 15. Each user's channel has L = 3 paths. The delay of each path t l,k is uniformly distributed on [0, 10 T c ]. Hence, as in the preceding example, the maximum delay spread is one symbol interval (i.e., I = 1). The fading gain of each path in each user's channel is generated from a complex Gaussian distribution and is fixed for all simulations. The path gains in each user's channel are normalized so that all users' signals arrive at the receiver with the same power. The smoothing factor is m = 2. The received signal is sampled at twice the chip rate ( p = 2). Hence the total number of users that this system can accommodate is 10. Figure 2.17 shows the performance of subspace blind adaptive receiver using the NAHJ subspace tracking algorithm discussed in Section 2.6.3 in terms of output SINR. During the first 1000 iterations there are eight total users. At iteration 1000, four new users are added to the system. At iteration 2000, one additional known user is added and three existing users vanish . We see that this blind adaptive receiver can closely track the dynamics of the channel.

Figure 2.17. Performance of a subspace blind adaptive multiuser detector in an asynchronous CDMA system with multipath.

graphics/02fig17.gif

We note that there are many other approaches to blind multiuser detection in multipath CDMA channels, such as constrained optimization methods [59, 60, 80, 187, 300, 305, 306, 427, 485, 487, 490, 498, 583, 584, 605], the auxiliary vector method [364],other subspace methods [10, 31, 252, 258, 272, 287, 446, 484, 548, 551, 564], linear prediction methods [69, 117, 207, 606], the multistage Wiener filtering method [156, 186], the constant modulus method [79, 218, 582], the spreading code design method [435], the maximum- likelihood method [56], the parallel factor method [447], the least-squares smoothing method [483, 610], a method based on cyclostationarity [351], and more general methods based on multiple-input /multiple-output (MIMO) blind channel identification [78, 214, 261, 298, 462, 494 “497].

2.7.5 Blind Multiuser Detection in Correlated Noise

So far in developing the subspace-based linear detectors and the channel estimation methods, the ambient channel noise is assumed to be temporally white. In practice, such an assumption may be violated due to, for example, the interference from some narrowband sources. The techniques developed under the white noise assumption are not applicable to channels with correlated ambient noise. In this section we discuss subspace methods for joint suppression of MAI and ISI in multipath CDMA channels with unknown correlated ambient noise, which were first developed in [551]. The key assumption here is that the signal is received by two antennas well separated so that the noise is spatially uncorrelated .

We start with the received augmented discrete-time signal model given by (2.169). Assume that the ambient noise vector n [ i ] has a covariance matrix graphics/086fig01.gif . Then the Pm x Pm autocorrelation matrix C r of the received signal r [ i ] is given by

Equation 2.218

graphics/02equ218.gif


The linear MMSE detector m 1 for user 1 is given by (2.177) with C r replaced by (2.218). As before, we must first estimate the desired user's composite signature waveform graphics/087fig01.gif given by (2.198). Notice, however, that when the ambient noise is correlated, it is not possible to separate the signal subspace from the noise subspace based solely on the autocorrelation matrix C r .

To estimate the channel in unknown correlated noise, we make use of two antennas at the receiver. Then the two augmented received signal vectors at the two antennas can be written, respectively, as

Equation 2.219

graphics/02equ219.gif


Equation 2.220

graphics/02equ220.gif


where H 1 and H 2 contain the channel information corresponding to the respective antennas. It is assumed that the two antennas are well separated so that the ambient noise is spatially uncorrelated . In other words, n 1 [ i ] and n 2 [ i ] are uncorrelated, and their joint covariance is given by

Equation 2.221

graphics/02equ221.gif


where S 1 and S 2 are unknown covariance matrices of the noise at the two antennas. The joint autocorrelation matrix of the received signal at the two antennas is then given by

Equation 2.222

graphics/02equ222.gif


where the submatrices are given by

Equation 2.223

graphics/02equ223.gif


Equation 2.224

graphics/02equ224.gif


Equation 2.225

graphics/02equ225.gif


We next consider two methods for estimating the noise subspaces from the signals received at the two antennas.

Singular Value Decomposition

Assume that both H 1 and H 2 have full column rank graphics/087fig02.gif ; then the matrix C 12 also has rank r . Consider the singular value decomposition of the matrix C 12 ,

Equation 2.226

graphics/02equ226.gif


The Pm x Pm diagonal matrix G has the form G = diag ( g 1 , ..., g r , 0, ..., 0), with g 1 · · · g r > 0. Now if we partition the matrix U j as U j = [ U j,s U j,n ] for j = 1, 2, where U j,s and U j,n contain the first r columns and the last Pm - r columns of U j , respectively, the column space of U j,n is orthogonal to the column space of H j :

Equation 2.227

graphics/02equ227.gif


where graphics/088fig01.gif denotes the orthogonal complement space of range ( H j ). User 1's channel corresponding to antenna j , f j ,1 , can then be estimated from the orthogonality relationship

Equation 2.228

graphics/02equ228.gif


Canonical Correlation Decomposition

Assume that the matrices C 11 and C 22 are both positive definite. The canonical correlation decomposition (CCD) of the matrix C 12 is given by [18]

Equation 2.229

graphics/02equ229.gif


or

Equation 2.230

graphics/02equ230.gif


The Pm x Pm matrix G has the form G = diag ( g 1 , ..., g r , 0, ..., 0), with g 1 · · · g r > 0. Let

Equation 2.231

graphics/02equ231.gif


Partition the matrix L j such that

Equation 2.232

graphics/02equ232.gif


where L j,s and L j,n are the first r columns and the last Pm - r columns of L j , respectively. The matrix U j are similarly partitioned into U j,s and U j,n . We have [580].

Equation 2.233

graphics/02equ233.gif


Note, however, that L j,s does not necessarily span the signal subspace range ( H j ) [580].

Now suppose that we have estimated the composite signature waveform of the desired user graphics/088fig02.gif , using the identified noise subspace L j,n . Since graphics/088fig03.gif , we have

Equation 2.234

graphics/02equ234.gif


where the second equality in (2.234) follows from (2.231) and the fact that U j is a unitary matrix; and the third equality follows from the fact that graphics/089fig01.gif .

Let the estimated weight vectors of the linear MMSE detectors at the two antennas be graphics/089fig02.gif . To make use of the received signal at both antennas, we use the following equal-gain differential combining rule for detecting the differential bit b 1 [ i ]:

Equation 2.235

graphics/02equ235.gif


Equation 2.236

graphics/02equ236.gif


We next summarize the procedures for computing the linear MMSE detector graphics/089fig03.gif in unknown correlated noise based on the discussion above. Let

Equation 2.237

graphics/02equ237.gif


be the matrix of M received augmented signal sample vectors at antenna j corresponding to one block of data transmission.

Algorithm 2.9: [Blind linear MMSE detector in multipath CDMA with correlated noise ”SVD-based method]

  • Compute the auto- and cross-correlation matrices:

Equation 2.238

graphics/02equ238.gif


  • Perform an SVD on graphics/089fig04.gif to get the noise subspace graphics/089fig05.gif .

  • Compute the composite signature waveforms graphics/089fig06.gif by solving

Equation 2.239

graphics/02equ239.gif


  • Form the linear MMSE detectors:

Equation 2.240

graphics/02equ240.gif


  • Perform differential detection according to (2.235) “(2.236).

Algorithm 2.10: [Blind linear MMSE detector in multipath CDMA with correlated noise ”CCD-based method]

  • Perform QR decomposition:

Equation 2.241

graphics/02equ241.gif


  • Perform an SVD on graphics/090fig01.gif :

Equation 2.242

graphics/02equ242.gif


  • Compute

Equation 2.243

graphics/02equ243.gif


where graphics/090fig02.gif is an upper triangular matrix.

  • Partition graphics/090fig03.gif . Compute the composite signature waveforms graphics/090fig04.gif by solving

Equation 2.244

graphics/02equ244.gif


  • Form the linear MMSE detectors:

Equation 2.245

graphics/02equ245.gif


  • Perform differential detection according to (2.235) “(2.236).

The procedure above is based on the fast algorithm for computing CCD given in [580].

Note that the two methods above operate on the Pm -dimensional signal vectors r j [ i ], j = 1,2. The same procedures can be applied to the decimated received signal vectors to operate on the Nm -dimensional signal vectors r j,q [ i ], j = 1,2, q = 0, ..., p - 1. As before, such decimation-combining approach reduces the computational complexity by a factor of graphics/090fig05.gif . It also reduces the number of users that can be accommodated in the system by a factor of p .

Simulation Examples

We illustrate the performance of the detectors above via simulation examples. The simulated system is the same as that in Section 2.7.3, except that the ambient noise is temporally correlated. The noise at each antenna j is modeled by a second-order autoregressive (AR) model with coefficients a j = [ a j ,1 , a j ,2 ]; that is, the noise field is generated according to

Equation 2.246

graphics/02equ246.gif


where n j [ i ] is the noise at antenna j and sample i , and w j [ i ] is a complex white Gaussian noise sample with unit variance. The AR coefficients at the two arrays are chosen as a 1 = [1, -0.2] and a 2 = [1.2, -0.3].

We first consider a five-user system. In Fig. 2.18 the performance of the Pm -dimensional blind linear MMSE detectors is plotted for both SVD- and CCD-based methods. The corresponding performance by the decimation-combining receiver structure is plotted in Fig. 2.19. Next a 10-user system is simulated and the performance of the Pm -dimensional blind linear MMSE detectors is plotted in Fig. 2.20.

Figure 2.18. Performance of Pm -dimensional blind linear MMSE detectors in a five-user system with correlated noise.

graphics/02fig18.gif

Figure 2.19. Performance of decimation-combining blind linear MMSE detectors in a five-user system with correlated noise.

graphics/02fig19.gif

Figure 2.20. Performance of Pm -dimensional blind linear MMSE detectors in a 10-user system with correlated noise.

graphics/02fig20.gif

It is seen from Figs. 2.18 “2.20 that CCD-based detectors are superior in performance to SVD-based detectors. It has been shown that the CCD has the optimality property of maximizing the correlation between the two sets of linearly transformed data [18]. Maximizing the correlation of the two data sets can yield the best estimate of the correlated (i.e., signal) part of the data. CCD makes use of the information of both graphics/091fig01.gif and graphics/091fig02.gif together with graphics/091fig03.gif and creates the maximum correlation between the two data sets. On the other hand, SVD uses only the information graphics/091fig03.gif and does not create the maximum correlation between the two data sets, and thus yields inferior performance.



Wireless Communication Systems
Wireless Communication Systems: Advanced Techniques for Signal Reception (paperback)
ISBN: 0137020805
EAN: 2147483647
Year: 2003
Pages: 91

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net