7.4 Code-Aided Techniques


7.4 Code-Aided Techniques

In preceding sections we discussed the use of linear predictive interference suppression methods, which make use of the spectral properties of the spread data signal. We also discussed improvement in these predictive methods by making use of a more accurate model for the spread-spectrum signal. In the latter situation, we considered in particular the first-order probability distribution of the data signal (i.e., binary valued) which led to the ACM filter and its adaptive transversal form. Further improvements in NBI suppression can be made by going beyond random modeling at the chip level and taking advantage of the fact that we must know the spreading code of at least one user of interest in order to begin data demodulation. Techniques for taking advantage of this are termed code-aided techniques , a term coined in [388].

This approach was first proposed in [381, 426] and has been explored further in several works, including [388 “390]. These works have been based primarily on detectors originally designed for linear multiuser detection. As noted in Section 2.2, in the context of multiuser detection, linear detectors operate by estimating the data sequence via linear model-fitting techniques and then quantizing the resulting estimates to get estimates of the data symbols themselves . Two of the principal such multiuser detection techniques are the zero-forcing detector, or decorrelator, and the linear MMSE detector. Recall that the decorrelator completely eliminates the multiple-access interference (MAI), with the attendant disadvantage of possibly enhancing the ambient noise, while the linear MMSE detector reduces the latter effect by minimizing the mean-square error between the linear estimate and the transmitted symbols. The linear MMSE detector has the further advantage of being more easily adapted than the decorrelator and it results in a lower bit-error rate under most practical circumstances [343, 386].

Although developed originally for the suppression of intersymbol interference and (later) MAI, these two methods can also be applied to the problem of suppressing NBI. This idea was first proposed in [381, 426] for the case in which the NBI signal is also a digital communications signal, but with a data rate much lower than the spread-spectrum chip rate. This digital NBI model finds applications, for example, in modeling the interference in multirate CDMA systems in which multiple spreading gains and multiple chip rates may be employed (e.g., [74, 333]). In [425], the decorrelator was employed to suppress the NBI in such cases, and comparison with even ideal predictive techniques showed significant performance gains from this method. The linear MMSE detector, in both fixed and adaptive forms, was proposed for suppression of digital NBI in [390], again resulting in significant performance gains over predictive techniques. The linear MMSE detector was explored further in [388, 389] for suppression of tonal and entropic narrowband interferers and for the joint suppression of NBI and MAI.

7.4.1 NBI Suppression via the Linear MMSE Detector

As before, we begin by considering the case of (7.1) “(7.2) in which there is only a single spread-spectrum signal in the channel (i.e., K = 1) in addition to the NBI signal and white Gaussian noise. We again adopt the discrete-time model (7.5), and (without loss of generality) restrict attention to the observations in a single symbol interval, say the zeroth one: [0, T ]. It is convenient here to represent the corresponding samples in vector form:

Equation 7.67

graphics/07equ067.gif


where for convenience we denote A A 1 ; b b 1 [0]; s contains the (normalized) spreading code of user 1:

Equation 7.68

graphics/07equ068.gif


i =[ i i 1 ... i N-1 ] T is a vector containing the NBI samples; and graphics/408equ05.gif is a vector containing the corresponding ambient noise samples. Denote by R i the covariance matrix of i (i.e., graphics/408equ01.gif ). For simplicity, we assume for the remainder of this section that the sampled interference signal is wide-sense stationary with zero mean, although some of the results given do not require this.

In this framework the linear MMSE detector has the form

Equation 7.69

graphics/07equ069.gif


where graphics/409fig10.gif is a weight vector chosen to minimize the mean-square error

Equation 7.70

graphics/07equ070.gif


As we have noted before, the motivation for this criterion is that we would like for the continuous estimator w T r of the symbol b to be as close to the symbol as possible in some sense before quantizing it. The MSE is a convenient and tractable measure of closeness for this purpose. Using (7.67), and the assumption that b , i , and n are mutually independent, (7.70) can be written as

Equation 7.71

graphics/07equ071.gif


Taking the gradient of the MSE with respect to w and setting it to zero, we get

Equation 7.72

graphics/07equ072.gif


Solving for w in (7.72), and using the matrix inversion lemma, we obtain the minimizing weights as

Equation 7.73

graphics/07equ073.gif


A useful figure of merit for assessing the NBI suppression capability of the linear detector with weights w is the output signal-to-interference-plus-noise ratio, which is defined in this situation as

Equation 7.74

graphics/07equ074.gif


Using (7.67), (7.73), and the assumption that b , i , and n are independent and zero mean, we have

Equation 7.75

graphics/07equ075.gif


Equation 7.76

graphics/07equ076.gif


Substituting (7.75) and (7.76) into (7.74), the output SINR for the linear MMSE detector is then given by

Equation 7.77

graphics/07equ077.gif


As noted previously, the NBI signal can be modeled in one of three basic ways: a tonal signal, an entropic narrowband stochastic process, or a digital data signal with data rate much lower than the spread-spectrum chip rate. We next analyze the performance of the linear MMSE detector against each of these three types of narrowband interference.

7.4.2 Tonal Interference

For mathematical convenience, we assume that the narrowband interference signal consists of m complex sinusoids of the form

Equation 7.78

graphics/07equ078.gif


where P l and f l are the power and normalized frequency of the l th sinusoid, and the { F l } are independent random phases distributed uniformly on (0,2 p ). The covariance matrix R i of the multitone interference signal i can be represented as

Equation 7.79

graphics/07equ079.gif


where

Equation 7.80

graphics/07equ080.gif


Denote graphics/410equ01.gif ,and graphics/410equ02.gif . Then graphics/410equ05.gif , and hence we have

Equation 7.81

graphics/07equ081.gif


where graphics/410equ02.gif . According to (7.77), let graphics/410equ04.gif . Then from (7.81) we can write

Equation 7.82

graphics/07equ082.gif


Assuming that the spread-spectrum user has a random signature sequence, we next derive expressions for the expected values of the output SINR with respect to the random signature vector s , for several special cases.

Case 1: m = 1. We have graphics/411equ01.gif , and

Equation 7.83

graphics/07equ083.gif


where we have used graphics/411equ02.gif and graphics/411fig10.gif . Substituting these into (7.82), we obtain

Equation 7.84

graphics/07equ084.gif


Therefore, when N is large, the energy of a strong interferer is almost completely suppressed by the linear MMSE detector.

Case 2: m = 2. From (7.81) we have

Equation 7.85

graphics/07equ085.gif


where graphics/411equ04.gif . Now using (7.82), we obtain

Equation 7.86

graphics/07equ086.gif


Using (7.85), we have

Equation 7.87

graphics/07equ087.gif


where graphics/411equ05.gif , and

Equation 7.88

graphics/07equ088.gif


where graphics/411equ06.gif . On the other hand, using (7.85), we can write

Equation 7.89

graphics/07equ089.gif


Substituting (4.55) and (7.89) into (7.86), we then have

Equation 7.90

graphics/07equ090.gif


Again we see that for large N , the interfering energy is almost completely suppressed. In general, it is difficult to obtain an explicit expression for E {SINR m } for m > 2. However, for the special case when the { g l } are mutually orthogonal, a closed-form expression for E {SINR m } can easily be found.

Case 3: Orthogonal { g l }. Assume that

Equation 7.91

graphics/07equ091.gif


This condition is met, for example, when f l - f K is a multiple of 1/ N for all l K. Under this condition of orthogonality, it follows straightforwardly that

Equation 7.92

graphics/07equ092.gif


The expected value of the output SINR with respect to the random signature vector s is

Equation 7.93

graphics/07equ093.gif


where graphics/412equ01.gif , and graphics/412equ02.gif . Figure 7.10 shows some numerical examples of tone suppression by the linear MMSE detector. In both plots the SINRs without interference are 10dB (after despreading). Each curve in the plots corresponds to one set of three-tone (or seven-tone) frequencies { f l } randomly chosen. (The vectors { g l } are not necessarily orthogonal.) Interestingly, it is seen from Fig. 7.10 that the output SINRs are centered at the value given by (7.93).

Figure 7.10. Numerical examples of multitone interference suppression in a CDMA system by the linear MMSE detector. The parameters are N = 31, A 2 = 1, and s 2 = 0.1. The interfering tones have the same power p l ranging from 1 to 500. Each curve in the plots corresponds to one set of (a) three-tone or (b) seven-tone frequencies { f l } randomly chosen. The SINRs are calculated by using (7.77).

graphics/07fig10a.gif

graphics/07fig10b.gif

7.4.3 Autoregressive Interference

Let us assume that the NBI signal is modeled as a p th order AR process, where p << N :

Equation 7.94

graphics/07equ094.gif


where { e n } is an i.i.d. Gaussian sequence with variance v 2 . Supposing that R i is positive definite, we first drive a closed-form expression for graphics/414equ03.gif . Using (7.94), we can write the following:

Equation 7.95

graphics/07equ095.gif


or, in compact form,

Equation 7.96

graphics/07equ096.gif


where A is the matrix appearing on the left-hand side of (7.95), i N-p =[ i n , i n -1 , ..., i n-N+p +1 ] T , i p =[ i n-N+p , i n-N+p -1 , ..., i n-N +1 ] T , and e N-p =[ e n , e n -1 , ..., e n-N+p +1 ] T . Multiplying both sides of (7.96) by their transposes and taking expectations, we obtain

Equation 7.97

graphics/07equ097.gif


that is,

Equation 7.98

graphics/07equ098.gif


where graphics/414equ01.gif and graphics/414equ02.gif are, respectively, the N x N and p x p autocorrelation matrices of the interference signal. Since A is nonsingular, then

Equation 7.99

graphics/07equ099.gif


Equation 7.100

graphics/07equ100.gif


Partition the N x N matrix A into the following four blocks:

Equation 7.101

graphics/07equ101.gif


where A 11 is of dimension ( N - p ) x ( N - p ), and A 12 is of dimension ( N - p ) x p . Substituting (7.101) into (7.100), we can write

Equation 7.102

graphics/07equ102.gif


Now most of the elements of graphics/415equ01.gif are explicitly given by (7.102), except for the southeast p x p block. But notice that graphics/415equ02.gif is a Toeplitz matrix, and the inverse of a nonsingular Toeplitz matrix is persymmetric (i.e., it is symmetric about its northeast-southwest diagonal) [158]. Therefore, the elements of the southeast p x p block of graphics/415equ01.gif can be found in the northwest p x p block, which have already been determined. Hence, with the aid of persymmetry, graphics/415equ01.gif is completely specified by (7.102). Straightforward calculation of (7.102) then shows that graphics/415equ01.gif is a bandlimited matrix, with bandwidth 2 p +1. Since it is symmetric, we need only to specify the upper p + 1 nonzero diagonals, as follows:

Equation 7.103

graphics/07equ103.gif


where D k contains the ( N - k ) elements on the k th upper (lower) diagonal of graphics/415equ01.gif , k = 0,1,..., p .

Next we consider the output SINR of the linear MMSE detector when the interferer is an AR signal. For the sake of analytical tractability, and to stress the effectiveness of the MMSE detector against the narrowband AR interference (versus the background noise), we consider the output SINR when there is no background noise (i.e., s 2 0). Using (7.103), we have

Equation 7.104

graphics/07equ104.gif


Equation 7.105

graphics/07equ105.gif


where in (7.104), we have made the approximation that D K [ i ] = D K [ N /2 ], 0 k p , 0 i N k “1, since when N >> p , it seen from (7.103) that on each nonzero diagonal most of the elements are the same; and in (7.105) we used the approximation graphics/416equ01.gif and thus dropped the second term in (7.104). The output SINR is then

Equation 7.106

graphics/07equ106.gif


As will be seen in Section 7.5, this SINR value is the same as an SINR upper bound given by the nonlinear interpolator NBI suppression method in the absence of background noise.

7.4.4 Digital Interference

Now let us consider a system with one spread-spectrum (SS) signal and one narrowband binary signal in an otherwise additive white Gaussian noise (AWGN) channel. We assume for now that the narrowband signal is synchronized with the SS signal. Furthermore, we assume a relationship between the data rates of the two users (i.e., m bits of the narrowband user occur for each bit of the SS user). (Given the typical data rates employed in many wireless systems, it is often reasonable to assume an integer relationship between the bit rates. Situations in which this is not true are considered in [57].) As shown in Fig. 7.11, the narrowband digital signal can be regarded as m virtual users, each with its virtual signature sequence. The first virtual user's signature sequence equals 1 during the first narrowband user's bit interval (i.e., a virtual chip interval) and zero everywhere else. Similarly, each other narrowband user's bit can be thought of as a signal arising from a virtual user with a signature sequence with only one nonzero entry. It is obvious from this construction that the signature waveforms of the virtual users are orthogonal to each other. However, in general, the k th virtual user has some cross-correlation with the spread-spectrum user. If we use r to denote the vectors formed by the cross- correlations , defined explicitly in (7.108), the cross-correlation matrix R of this virtual multiuser system has the following simple structure (note that the SS user is numbered 0, and the m virtual users are numbered from 1 to m ):

Equation 7.107

graphics/07equ107.gif


Figure 7.11. Virtual CDMA system: synchronous case.

graphics/07fig11.gif

We have assumed that the narrowband user had a faster data rate than the SS user (but this rate is still much slower than the chip rate). The opposite case can also hold, and our analysis applies to it as well, although we do not discuss that case explicitly. The covariance matrix of the system in that case has the same structure as (7.107).

Let T be the bit duration of the SS user, so that T/m is the bit duration of the narrowband user. Similarly, let N be the processing gain of the SS signal, so that the chip interval has length T/N . By our assumption that the interferer is narrowband, we have N >> m . Let s(t) be the normalized signature waveform of the SS user [i.e., s(t) is zero outside the interval [0, T ] and has unity energy]. Similarly, let p(t) be the normalized bit waveform of the narrowband user [i.e., p(t) is zero outside the interval [0, T/m ] and has unity energy]. Then the normalized signature waveform of the k th virtual user is p k (t) = p(t “(k “1) T/m ). The cross-correlation vector mentioned earlier is r = [ r 1 r 2 ... r m ] T , where r k is the cross-correlation between the k th virtual user and the SS user, defined as

Equation 7.108

graphics/07equ108.gif


where the inner product notation denotes graphics/417equ01.gif

We assume that the SS user and the narrowband user are sending digital data through the same channel characterized by AWGN with power spectral density s 2 . Let A I be the received amplitude of the narrowband signal and A be the received amplitude of the SS signal. We use the notation that the narrowband user data bits during the interval (0, T ) are d 1 , d 2 ,..., d m , and the SS bit is b . When the users are synchronous, it is sufficient to consider the one-shot version of the received signal:

Equation 7.109

graphics/07equ109.gif


where n(t) is the white Gaussian noise with power spectral density s 2 .

The linear MMSE detector for user 0 (i.e., the SS user) is characterized by the impulse response w L 2 [0, T ], such that the decision on b is

Equation 7.110

graphics/07equ110.gif


A closed-form expression for w is given by [520] as

Equation 7.111

graphics/07equ111.gif


where w T = [ w , w 1 , ..., w m ] is the first row of the matrix

Equation 7.112

graphics/07equ112.gif


and A = diag { A , A I , ... A I }. Substituting (7.107) into (7.112), we have

Equation 7.113

graphics/07equ113.gif


The following matrix identity can be easily verified ,

Equation 7.114

graphics/07equ114.gif


where g = 1 “ r T r / a b .

Now on defining a = 1 + s 2 / A 2 and b = 1 + s 2 / A 1 2 , the first row of C in (7.113) is then given by

Equation 7.115

graphics/07equ115.gif


Substituting (7.115) into (7.111) we get an expression for the linear MMSE detector for the SS user:

Equation 7.116

graphics/07equ116.gif


Using (7.74), the SINR at the output of the linear MMSE detector w ( t ) becomes

Equation 7.117

graphics/07equ117.gif


That is, the SINR is the ratio of the desired SS signal power to the sum of the powers due to narrowband interference and noise at the output of the filter w ( t ). Substituting (7.116) into (7.117), we obtain

Equation 7.118

graphics/07equ118.gif


Figure 7.12 illustrates the virtual multiuser system for the asynchronous case. Let t be the fixed time lag between the spread-spectrum bit and the nearest previous start of a narrowband bit (i.e., 0 t T/m ). We see that because of the time lag t , the virtual user 1 in Fig. 7.11 effectively contributes two interference signals during an SS bit interval: at the beginning and end of the SS bit interval, respectively. We can therefore treat the asynchronous system as a synchronous system with one additional virtual user (i.e., a synchronous system with one SS user) and m + 1 virtual users. The preceding analysis therefore holds in the asynchronous case as well, with only minor modification.

Figure 7.12. Virtual CDMA system: asynchronous case.

graphics/07fig12.gif



Wireless Communication Systems
Wireless Communication Systems: Advanced Techniques for Signal Reception (paperback)
ISBN: 0137020805
EAN: 2147483647
Year: 2003
Pages: 91

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net