+ All Categories
Home > Documents > A Family of Suboptimum Detectors for Coherent MUD

A Family of Suboptimum Detectors for Coherent MUD

Date post: 02-Jun-2018
Category:
Upload: issayed
View: 220 times
Download: 0 times
Share this document with a friend

of 8

Transcript
  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    1/8

    683

    E E E

    J O U R N A L ON

    S E L E C T E D

    A R E A S

    IN COMMUNICATIONS.

    V O L . 8.

    NO. 4. MA Y 199

    A Family of Suboptimum Detectors

    for

    Coherent

    Multiuser Communications

    Z H E N H U A X I E , R O B E R T T . S H O R T . A N D C R AIG K . R USHFOR TH

    Abstract-In this paper we consider a class of suboptimum detectors

    for data transmitted asynchronously by K users employing direct se-

    quence spread spectrum multiple access (DS/SSMA) on the additive

    white Gaussian noise (AWGN) channel. The general structure of these

    detectors consists

    of

    a bank of matched filters, a linear transformation

    that operates on the matched-filter outputs, a nd a set of threshold de-

    vices. The linear transforma tions are chosen

    to

    minimize either a mean

    squared error or a weighted squared error performance criterion. Each

    detector can be implemented using a tapped delay line. The number of

    computations performed per detected bit is linear in K in each case ,

    and the resulting detectors are thus much simpler than the optimum

    detector. Under typical operatin g conditions, these d etectors will per-

    form much better than the conventional receiver and often nearly as

    well as the optimum detector.

    I . I N T R O D U C T I O N

    E consider

    in

    this paper a coherent asynchronous

    W

    K-user DS/SSM A system for transmitting signals

    on the additive white Gaussian noise channel. The re-

    ceiver makes symbol estimates using a detector that con-

    sists of a bank

    of

    matched filters followed by a decision

    algorithm. Tw o well-known detectors of this type are the

    conventional receiver, which simply compares each

    matched-filter output to a threshold, and the maximum-

    likelihood

    ( M L )

    sequence detector whose decision algo-

    rithm is the Viterbi algorithm [

    1

    1-[4]. The complexity of

    the M L detector grows exponentially with K, and is thus

    impractical unless the num ber of users is quite sma ll. At

    the same time, the performance of the conventional re-

    ceiver deteriorates rapidly as t he number

    of

    users in-

    creases. We are therefore led to study suboptimum detec-

    tors that are easier to implement than the M L receiver but

    that perform much better than the conventional receiver.

    Some examples of suboptimum detectors that have been

    previously studied are a sequential decoding algorithm

    [ 5 ] ,

    a decision-feedback equalizer [6], 171 for asynchronous

    DS/SS MA system s, and an optimized linear multiuser de-

    tector for synchronous DS/SSMA systems

    [SI.

    In this paper, we consider a class of suboptimum de-

    tectors for the asynchronous DS/SSM A system whose de-

    Manuscript received February 2 1 , 1989; revised September 18. 1989.

    This work was supported by the Unisys Corporation under the University

    of Utah Contract 5-20516. This paper was presented in part at MILCOM

    '89, Boston, MA, October 15-18, 1989.

    Z . Xie and C.

    K .

    Rushforth are with the Department of Electrical En-

    gineering, University

    of

    Utah, Salt Lake City, UT 841 1 2 .

    R .

    T. Short is with Communication Syste ms Division. Unisys Corpo-

    ration, Salt Lake City,

    UT

    841 16.

    IEEE Log Number 9034793.

    cision algorithms consist of a linear transformation

    T

    fol-

    lowed by a set of threshold devices. This approach is

    motivated by equalization tec hniqu es developed f or chan -

    nels with intersymbol interference [ 111 and by the ap-

    proaches taken in [6] and [SI. Because of the sim ilarities

    between the two problems,

    it

    should not be surprising that

    techniques which are effective in combatting intersymbol

    interference can also be used to advantage in the multi-

    access problem. In addition to the obvious similarities,

    however, there are some important differences. For ex-

    ample, the near-far problem (i. e., the problem of signif-

    icantly different user powers) encountered in multiple-ac-

    cess communications has no counterpart in the

    intersymbol interference context. Moreover, the system

    designcr can typically exercise more control over the level

    of

    interference in designing a multiple-access system

    through his or her choice of signature sequences than

    would be possible in the intersymbol interference prob-

    lem. Thu s, we might reasonably expect suboptimum mul-

    tiple-access receivers to perform well under a broader

    range of conditions than their intersymbol-interference

    counterparts .

    We obtain two different versions of T using two differ-

    ent performance criteria: minimum mean squared error

    and weighted least squares. These choices, though not

    op-

    t imum in terms of bit-error probability, are mathemati-

    cally tractable and lead to elegant and simple detection

    structures that can be implemented using tapped delay

    lines. These structures have computational complexities

    per detected bit which are linear

    in

    K ,

    and are thus much

    simp ler than the optimu m detector . This result rests on

    the assumption that the parameters

    of

    the system have

    been computed and are fixed. The practical problems as-

    sociated with estimating the parameters of the system and

    adapting the structure of the detector must be faced re-

    gardless of the decision rule adopted and thus do not ap-

    preciably affect the comparisons we make.

    Our initial results are based on the assumption that the

    linear transformation operates on the entire received

    waveform to estimate the entire transmitted sequence.

    This approach requires too much m emory and en tails too

    much decoding delay to be practical, so we next consider

    some modified algorithms that have small fixed decoding

    delays. We also discuss appropriately modified versions

    of two schemes that have been widely used to combat in-

    tersymbol interference: the linear equalizer and the deci-

    sion-feedback equalizer.

    0733-87 16/90/0500-0683$01

    OO

    @ 1990 IEEE

  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    2/8

    684

    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS. VOL. 8.

    NO.

    4. MAY 1990

    Matched

    Filter

    Bank

    In Section 11, we review the

    DS/SSMA

    signaling

    scheme and present a discrete model for its analysis. The

    minimum mean squared error (MMSE) detector, its per-

    formance, its implementation, and various suboptimum

    modifications of it are developed and discussed in Section

    111. The computational complexity of the MMSE detector

    is shown to be

    3 K

    multiplications/bit. In Section IV, the

    linear equalizer is derived and its performance is ana-

    lyzed. One common feature of the MMSE detector and

    t he

    linear equalizer is that the preliminary estimate of the

    transmitted bit sequence obtained using the linear trans-

    formation T is biased. This com plicates the analysis and

    leads to a performance that depe nds on the interfering sig-

    nal power. Th e weighted least squares (WLS ) detector de-

    scribed in Section V avoids this problem by providing an

    unbiased estim ate of the transmitted sequence. T he com-

    putational complexity of the W LS detector is once again

    3K multiplications /b it, and its bit-error probability and

    asymptotic efficiency are independent of the interfering

    users powers.

    A

    natural suboptimu m implementation of the WL S de-

    tector yields the well-known decision feedback equalizer

    [6], which we discuss in Section VI. In Section VII, we

    summarize the results of several computer simulations

    conducted to illustrate the performances of the detectors

    described in this paper and to compare them to the per-

    formances of the conventional receiver and the optimum

    (ML) receiver. In many circumstances of interest, the re-

    ceivers described here perform much better than the con-

    ventional receiver and nearly as well as the more compli-

    cated M L receiver.

    Dension

    Algorithm

    11. P R E L I M I N A R I E S

    We consider BPSK transmission through a common

    AWGN channel shared by

    K

    asynchronous users employ-

    ing

    DS/SSMA,

    as illustrated in Fig. 1. The received sig-

    nal

    r ( r )

    can be written in the form 131

    M K

    r t ) =

    C

    b , ( i ) ~ , ( t - i ~ - 7 , ) + n ( r )

    1 = I

    = I

    M K

    = h 1 1 1 ) ( r ( 4 )1 1 l , ( f r ( m ) T

    111

    =

    I

    - 7 , ( 1 1 1 ) + n ( r )

    ( 2 . 1 )

    where n t ) s additive white Gaussian noise with two-

    sided power spectral density N 0 / 2 , k ( m )

    1

    = m mod

    K , ~ ( m )

    1 is the integer part of m/K, and M is the

    number of bits transmitted by each user.

    b,

    i

    )

    E { -

    ,

    1

    } is the ith transmitted bit of the

    k t h

    user,

    S,

    r ) =

    J ~ w ,

    , ( 1 ) COS

    a c t

    +

    0,

    ),

    t

    E

    [o ,

    T )

    ( 2 . 2 )

    is the signature waveform of the k t h user,

    a , r )

    is the

    spreading signal of the kth user normalized to unit power,

    Fig.

    I .

    System model for asynchronous

    DSiSSMA

    communications.

    carrier phase,

    a,

    s the common ca rrier frequency, and w ,

    is the received signal power of the kth user. The powers,

    phases, and time delays of all users are assumed to be

    known, and without loss of generality the users are or-

    dered in such a way that the time delays satisfy 0 ~

    ~ < T . In practice, these system parameters

    must of course be estimated and continually updated, a

    problem that we are currently studying.

    The spreading signal

    a,

    ( t ) , which is used to reduce

    multiuser interference, is a signal of duration

    T

    seconds

    that can be written in the form

    L

    r ) = u t ~ p T f I

    ( m

    - ( 2 . 3 )

    111

    =

    I

    where

    p T ,

    t ) s the spreading chip waveform whose du-

    ration is T ,

    =

    T / L seconds and { a t , E ( - 1 , is

    the spreading sequence of the kth user. The assumption

    regarding the duration of the sign ature waveform has been

    made almost universally by others working on this prob-

    lem [ l ] , [ 2 ] , [ 3 ] , and our results show that

    i t

    does not

    seriously limit multiple-access performance. If additional

    protection against jamming or unauthorized interception

    were required, the generalization would be analytically

    straightforward, although the implementation would be

    somewhat more complicated.

    The matched-filter output y, (

    1,1

    )

    (

    7 ( m

    )

    associated with

    the k( m) th user

    in

    the r( m )t h bit interval is given by [3]

    9 1 1 l ) + l ) T + T i ( l r l I

    J h d ~ ~ ) )i7,,),lr+,h

    r f ) O , I , ( t - 7 m ) T- Q , I 1 1 , ) dr

    111 + K

    I

    = b m T i ) )

    K

    , , I 1 ,

    1

    , r ( m

    = t i - K + l

    r 4 ) + 1 1 1 ) ( d ~ ) )

    (2 .4)

    where

    m

    H1,(m)= s , ( r -

    s , ( t

    +

    mT

    7, r

    ( 2 . 5 )

    is the signal crosscorrelation functi on. We see that

    y, ( 7 m ) depends upon the transmitted bits, the sig-

    -m

    rk is the time delay of the k t h user,

    0,

    is the kth users

    nal crosscorrelations, and the noise.

  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    3/8

    X I E ( ' 1

    I / . :

    S U B O P T I M U M

    DETECTORS

    F O R M U L T I U S E R C O M M U N I C A T I O N S

    685

    Using vector notation,

    it

    is not difficult to show that the

    MK matched-filter outputs yL(,, q ( t n ) can be expressed

    as [ I O ]

    y =

    PMb +

    n ( 2 . 6 )

    where

    y ( i ) = [ y l ( i > , 2 ( i> , . * Y K ( i ) l T ~

    ~ ,

    b ( i ) = [ b l ( i ) , b 2 ( i ) , * * * b K ( i ) l T E - I , I

    I ,

    n

    =

    [ n (

    ) , n(2) ' ,

    *

    . n ( M ) ' ] '

    E

    R M K ,

    y = [ y (

    )' ,

    y(2 ) ' , * * . ,y ( M ) ' ] '

    E

    R M K ,

    b

    = [ b ( l ) ' , l ~ ( 2 ) ~ ,

    . ~ ( M ) ' ] ' E { - 1 , I } M K ,

    n ( i > = [ n l ( i > , 2 ( i ) , .

    n K ( i ) ] ' E R ~ ,

    and

    PM =

    H ( 0 )

    H 1f

    0

    H ( l ) H ( 0 ) H ( 1 ) '

    0

    0

    . . .

    0

    H ( 0

    0

    . .

    -

    -

    0

    0

    . . .

    . . .

    The vector y is a sufficient statistic for estimating the

    transmitted bits b . The elem ents of all vectors are ordered

    in accordance with their relative appearances

    in

    t ime. PM

    is a symmetric matrix which we assume to be positive

    definite and hence invertible, but most of the results we

    present can be easily generalized.

    All decision algorithms considered in this paper com-

    prise two steps. First, a linear estimate b = Ty of the

    transmitted bits b is obtained from the matched-filter out-

    put y. The constraint that b

    E

    {

    , 1

    } is dropped in this

    process and arbitrary real-valued es tima tes are allowed .

    Second, the components of the estimate

    b

    are compared

    to a threshold of zer o, and th e Cnal bit estim ates are taken

    to be the compo nents of sgn [

    b] .

    111. T H E M M S E DETECTOR

    We first study the linear minimum-mean-squared-error

    (MM SE) detector. Formally, the problem can be stated as

    follows: first a mapping T:R,"" --t R M K uch that the per-

    formanc e criterion

    E {

    ( b b )

    '

    b 8 ) is minimized,

    where the estimate b is given by b = Ty. The mapping

    that achieves this minimum is

    T = ( P M + N O / 2 Z ) - ' .

    ( P M

    +

    N , / W b

    =

    y ,

    ( 3 . 1

    In practice, we could estimate b by solving the linear

    equation

    ( 3 . 2 )

    a process that can be carried out efficiently using LU de-

    composition, forward elimination, and back substitution

    [

    1 I] by the system shown in Fig. 2 . The inputs are the

    MK matched-filter outpu ts y, the outputs are the estimated

    bits sgn [ b ] , nd the L , and U , are matrices that arise dur-

    ing the process of block LU decomposition

    [

    12, p .

    11 1 .

    The basic operations of m atrix-vector multiplication and

    vector addition can be simply implemented using a tapped-

    delay-line archi tectur e. To detect MK transmitted bits re-

    quires 3 M K2 multiplications. Therefore, the complexity

    of this detector is 3 K mu ltiplicat ions/b it, which is linear

    in

    K

    and is independent of

    t he

    transmission length M.

    In the absence of noise, the MMSE estimate becomes

    b = PGly. At the other extreme, i . e . , when

    No

    >> w, or

    all j , T reduces to the identity mapping and the MMSE

    detector reduces to the well-known conventional receiver.

    A . Performance of

    the

    MMSE Detector

    We now con sider the performance of the MM SE detec-

    tor. The performance criteria we are the bit-error prob-

    ability and the asymptotic efficiency as defined by Verdu

    We show in Appendix A that the probability that the ith

    141.

    bit of the kth user is detected in error is given by

    c

    ,MMSE(i) = 2

    - M K +

    I

    h l , l ( V ( / l I {

    - 1 . 1 )

    ( 3 . 3 )

    where

    a

    is the [ i 1 ) K + k]th diagonal entry of ( P

    i s t he [ ( i

    -

    l ) K + k]th row of

    (

    P

    +

    iVo /2Z) - ' f lM , and

    + NO/2Z)-I PM (P I z . I + N 0 / 2 Z ) - I 3 [g l ,

    g,,

    . * * 9

    gMK

    1

    dv.

    u / 2 1

    Q ( x ) =

    I sm

    Each term in the sum in ( 3 . 3 ) is the error probability for

    the ith bit of the kth user, conditioned on a particular

    combination of the remaining bits. Each such combina-

    tion is equally likely, thus accounting for the factor

    and the sum is taken over all 2 M K I such com-

    binations.

    Verdu [4] defines the asymptotic efficiency of the k t h

    user, whose bit error probability is

    P k ,

    to be

    qk

    = sup 0

    2 - M K

    +

    I

    {

    l im o + O k ( u ) / Q [ ( m ; L ) " L / u ] < + C O ] .

    ( 3 . 4 )

    To determine t he asymptotic efficiency qpMSEf the

    MMSE detector, we note that the dominant term in (3 .3 )

    as N o -+ 0 is

    Q

    -MK I

  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    4/8

    ~

    686

    I EEE J O U R N A L O N S E L E C T E D A R E A S IN C O M M U N IC A T IO N S .

    VOL

    X. NO 4. MAY

    I990

    It follows that

    Fig.

    2 .

    MMSE and

    W L S

    detector architecture

    ( 3 . 5 )

    V p M S E = max2

    Equations (3.3 ) and (3.5) characterize the perform ance of

    the MMSE detec tor . We see tha t y p M S F s, in general,

    dependent on the interfering signal power. This depen-

    dence is a consequence of the fact that the estimate b

    =

    Ty defined by (3.2) is biased.

    To compare the performance of the MMSE detec tor

    with that of the conventional receiver, we consider the

    special case for which No

  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    5/8

    XIE PI U / . .

    S U B O P T I M U M D E T E C T O K S F O K M U L T I U S k K C O M M U N I C A T I O N S 687

    it is reasonable to expect this type of behavior for any

    detection scheme that operates

    on

    only a subset of the

    matched-filter outputs.

    I V. L I N E A R Q U A L I Z E R

    In this section, we formulate the MM SE detection prob-

    lem under a constraint that the detector delay be finite,

    say approximately JK T seconds with J

  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    6/8

    688 I E E E

    J O U R N A L ON SELECTED A R E A S I N C O M M U N I C A T I O N S .VOL 8. NO 4. MAY 1990

    As in the case of the MMSE detector, the estimate of

    (5.2 ) can be efficiently determined using block

    LU

    de-

    composition followed by forward and backward substi-

    tution [12]. The system shown in Fig. 2can also be used

    to implement the WLS detector, and t he computational

    complexity of the WLS detector is 3 K multiplica-

    tions /bit .

    In a manner similar to that described in Appendix A, it

    can be shown that the probability that the ith bit of the

    kth user is in error is

    a great simplification over the expressions for PpMSE)

    and P k E ( i ) .Furthermore, PyLs i ) s independent of the

    interfering signal power [8].

    The asymptotic efficiency of the WLS detector is

    which is also independent of the interfering signal power

    and is often substantially supe rior to the efficiency o f the

    conventional receiver. This result is identical to that ob-

    tained fo r the MM SE detector when No

  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    7/8

    fective way of examining the performance of the DFE is

    through simulation. We describe the results of several

    simulations in the next section.

    VII . S I M U L A T I O N S

    To provide a basis for com paring the various detectors

    discussed in this paper, we conducted an extensive series

    of Monte-Carlo simulations. The schemes we evaluated

    were finite-delay versions of the MM SE and W LS detec-

    tors, each with sub sequence length

    I

    = 9K and an overlap

    of K bits between adjacent subsequences; a linear equal-

    izer with J = 4; t he DF E; the conventional receiver; and

    the ML sequence detector. In all cases, the modulation

    was equiprobable BPSK with rectangular bit and chip

    waveforms. In cases for which the ML receiver was too

    complex to simulate, we used the performance of the sin-

    gle-user system to provide a bound.

    Among the examples studied were two asynchronous

    DSISSMA configurations with K = 2 and 18 and spread-

    ing codes of lengths

    S

    and 12 7, respectively. T he cross-

    correlation coefficients in the two-user system were taken

    to be H 1 , ? (0 ) 0.3 and HI,?( ) = 0.1, and the code

    sequences for K =

    18

    were taken from [ 131. We used

    relative time delays of 0.05 i

    1 )

    T , i =

    1 ,

    2 , . . . 18,

    for the eighteen-user system, and we set all its phase lags

    to zero.

    Fig . 6 shows plots of the average bit-error probabilities

    of several different receivers as functions of the signal-to-

    noise ratio for K =

    18.

    In this example, the powers of all

    users are equal. Fig. 7 shows plots of the bit-error prob-

    ability

    of

    the first-user versus the power of the interfering

    user

    in

    the two-user asynchro nous system to illustrate the

    near-far capabilities of the various detectors. These re-

    sults are typical of the many configurations we simulated.

    From these plots , and from the many other simulations

    we conducted, we m ake the following observations. First,

    all the suboptimum detectors proposed in this paper per-

    form much better than the conventional receiver and

    nearly as well as the ML receiver under

    a

    wide variety of

    conditions. S econd, these detectors are quite robust

    in

    the

    face of widely different signal pow ers. T he linear equal-

    izer and the DFE perform somewhat better than the sub-

    optimum finite-delay versions of the MM SE and W LS de-

    tectors. A s predicted, the DFE is more robust than the

    linear equalizer in the face of widely different signal power

    levels.

    To compare these results to those obtained previously

    using a sequential decoding algorithm [SI we plot in Fig.

    8

    the bit-error probability achieved in the eighteen-user

    configuration using the linear equalizer, the D FE , and the

    sequential decoding algorithm. We see that these three

    detectors exhibit about the same performance. Th e advan-

    tage of the detectors studied in this paper, as compared

    with the sequential decoding algorithm, is their s impler

    structure. Their s im plicity, combined with their excellent

    performance as demonstrated by these examples, makes

    them very attracti ve practical algorithm s.

    VIII. C O N C L U S I O N S

    The primary contribution of this paper is the develop-

    ment and evaluation of a family of suboptimum DS/SSMA

    C on ve nud R ece iver

    opunum

    ingle-Usa Detector

    SuboptimumWLS Detector

    Suboplimum MMSE

    etector

    Decision Fe ed kk Equalizer

    10

    0 1 2 3 4 5 6 7 8 9

    Fig.

    6 .

    Bit-error probability for conventional receiver, optimum single-user

    detector, suboptimum M M S E detector. suboptimum

    W L S

    detector. lin-

    ear equalizer, and decision feedback equalizer with

    K

    = 18 and

    L

    =

    127.

    /.

    /.

    - - - - onvenuonal Receiver

    Subopumum

    L

    Receiver

    WLS

    Detector

    Suboplmum MMSE

    Dewtor

    _ _ _ _

    eclsion

    FeedbaJ: qualizer

    Llnear F4uallzer

    --__

    689

    IE ~ f

    r l

    S U B O P T IM U M D F T F C T O R Y FOR M U L T IU Y F R C O M M U N I C A T I O N \

    I

    ~

    _ _ ~~

    ~ _ _ _ _ _ ~ ~

    ~~

    ~~ ~

    t

    1

    I

    3

    6 9 12 15

    10..

    Fig.

    7 .

    Bit-error probability versus interfering user's power. for conven-

    tional receiver,

    M L

    receiver. suboptimum

    M M S E

    detector. suboptimum

    W L S detector. linear equalize r, and decision feedback equa lizer with

    K

    =

    2 .

    L = 5 . and w , / N , ) = 5 dB.

    lo-

    10

    ~o~oglo(wlmolo)

    Fig.

    8.

    Bit-error probability for linear equalizer. decision feedback equal-

    izer. and sequential decoding algorithm with K

    =

    18 and L

    =

    127.

    detec tors whose computational complexity is only linear

    in the number of users and yet which perform much better

    than the conventional receiver and nearly as well as the

    ML sequence detector in many practical circumstances.

    The simple structures and excellent performances of these

  • 8/11/2019 A Family of Suboptimum Detectors for Coherent MUD

    8/8

    690 l E E E J O U R N A L O N S E L E C T E D A R E A S I N C O M M U N I C A TI O N S , VOL.

    8.

    N O

    4.

    MAY 1990

    detectors make them very attractive altern atives to the

    conventional receiver and the

    M L

    detector.

    The results described in this paper were obtained under

    the assumption that all system parameters (signal phase.

    power, and delay) are known.

    In

    practice, these parame-

    ters must be estimated and the receiver structure contin-

    ually modified to reflect the updated estimates. The ul t i -

    mate evaluation and comparison of the detectors studied

    here cannot be carried out without considering the effects

    of noisy estimates

    on

    their performances. We are cur-

    rently investigating this issue.

    A P P E N D I X

    In this Appendix, we consider the bit-error probability

    of the MM SE detector. T he probability that the k t h user's

    ith bit is detected in erro; is given by

    pFMSE

    Pr { [sgn ( T Y ) l , l - , ) , + , 1 I b , ( i ) = 1 )

    b , i )

    =

    1 )

    quences.

    /EI,.E Trtrm

    Coimrtu. . vol. COM-35. pp. 87-98. Jan.

    1987. .

    131

    S .

    Verdu. Miniinurn prohability of error for asynchronous Gaussian

    multiple-access channels. / F E E

    Trtii i. . /fifitrrti.

    Tlioor?, vol. IT-32.

    pp. 85-96, J a n . 1986.

    141 -.

    Optimum inultiuser asymptotic eflicicncy. l E E E

    Trctm.

    Cornmuti..

    vol. COM-34, pp.

    890-897.

    Sept.

    1986.

    IS] Z. Xie, C. K . Rushforth, and R . T. Short, Multi-user signal detec-

    tion using sequential decoding.

    l E E E

    Trutis.

    Cotntnun. , vol. 37,

    1989.

    161

    R . T. Short, Multiple user receiver structures. Ph.D. dissertation.

    Dcp. Elcc. En g . .

    U n i v .

    Utah. Dec.

    1988.

    171 M.

    K .

    Varanasi and

    B .

    Aazhang. An iterative detec tor

    l o r

    asyn-

    chronous spread-spectrum multiple-access syateins, in Proc..

    181

    R .

    Lupas and S . Vcrdu, Linear multiuser detectors for synchronous

    code-division multip le-ac cess channels.

    / E E E

    Trtrris /r fitriti. T l i ~

    o r y ,

    vol. 35, pp. 123-136, Jan. 1989.

    191 R . Lupas and S . Verdu, Optimum near-far resistance of linear de-

    tectors for code-division multiple-access chan nels, in Proc.

    I n f .

    Symp.

    Inform.

    Theorv,

    June

    19-24, 1988,

    Kobe. Japan. p.

    14.

    1101 -. Near-far re\istance of linear detectors for code-division mul-

    tiple-access channels.

    / E E E

    Truris.

    Conirtiuu.,

    vol. COM-37,

    1989.

    [ I J . G. Proakis,

    D i g i f t i /

    Co, r i r t r io i i c . t r r i t~ r i .

    New York: McGraw-Hill.

    1983.

    [ 121

    G. H. Goluh and

    C. F.

    Van Loan.

    Mtirri i

    Compuftrf iot i . \ . Baltimore.

    MD: The Johns Hopkins University Press, 1983.

    [

    131

    F . Gebhardt and C. L. Weber. Aperiodic correlation properties of

    pseudonoise codes. Tech. Rep., USCEE-430. Dcp. Elec. Eng..

    U n iv .

    Southern California. Oct.,

    1972.

    GLOBECOM'88.

    Hollywood. FL. N O V . 1988, pp. 556-560.

    Zhenhua Xie wa\ born

    in

    Zhejidng, China, on

    July

    15,

    1958 He received the B

    S

    degree

    in

    electrical engineering from Zhejiang Univer\ity,

    China.

    in

    1982, and the M S dnd Ph D degrees

    in

    electrical engineering from the Univer\ity ot

    Utah.

    i n

    1985 and 1989, respectively

    He

    \

    currently d po\t-doc fellow in Electrical

    Engineering at the University of Utah

    Hi5 re-

    search interest\ include digital signal proces\ing,

    vision. and multiu\er communication\

    where

    (

    .

    I

    symbolizes the

    t h e k t h

    element of the vector

    inside the parentheses. Since the noise component [ (

    PM

    + N 0/ 2Z )- 'n l c l - i s Ga us si an w ith z e ro me an a nd

    of

    E {

    Pw

    + N 0 / 2 N '

    n n T ( f i w

    +

    N , ) / 2 C }

    variance equal to the [ i - 1

    )

    K

    +

    k]th diagonal element

    = O w + / 2 Z ) - '

    P,( @V +

    N I ) / ~ Z ) - ' , ( A . 2 )

    P y M S E ( i )an be expressed as a sum of Q-functions,

    where

    Specifically, if we denote the

    [

    i 1 )

    K

    +

    k]th diagonal

    entry of the matrix in (A .2 ) a s

    N U / 2 a

    nd the [ i 1 ) K

    +

    k]th row of the matrix

    ( P M + N 0 / 2 Z

    ) - ' P w a s

    [g I , g , ,

    * *

    ,,I, then p,MMsE(i an be written as

    c Q

    Y M S E ( j ) = 2-MK+I

    ( A . 3 )

    . l , l (V (

    / ) ) E ( 1 . 1

    )

    of Electrica l Engineerii

    research interests lie

    in

    cessing.

    Robert

    T.

    Short

    was born in Boulder, CO. on

    May 8, 1954. He received the B.S. degree

    in

    elec-

    trical engineering from New Mexico State Uni-

    versity

    in

    December of

    1975.

    He worked for Motorola Government Electron-

    ics Division, Scottsdale. AZ, (1976-1981). Hew-

    lett-Packard Corporation, Fort Collins, CO (1981-

    1984). and Unisys Corporation, Salt Lake City,

    UT (1984-1989). before receiving the Ph.D. de-

    gree in electrical engineering in December of

    1988. He is now on the faculty in the Department

    ng at the University of Utah in Salt Lake City. His

    the areas of communication theory and signal pro-

    which can, in princip le, be calculated if ( p,,,

    +

    N 0 / 2 Z ) - '

    is given.

    REF ERENCES

    I ] M. B. Pursley, D. V. Sarwate. and W. E . Stark. Error probability

    for direct-sequence spread-spectrum multiple-access coinmunica-

    tions-Part

    I :

    Upper and lower bounds. / F E E

    Trtrris.

    Cortirtlrtrr. . vol.

    121 J . S . Lehnert and M. B. Pursley. Error probability tor binary direc t-

    sequence spread-spectrum communication with random signature se-

    COM-30. pp. 975-984. May 1982.

    Craig K. R ushforth was born

    in

    Ogden. UT. He

    received the B.S.. M.S., and Ph.D. degrees in

    electrical engineering from Stanford University,

    Stanford. CA. in

    1958, 1960.

    and

    1962.

    respec-

    tively.

    He has served

    on

    the facultieb of Utah State

    University and Montana State University and has

    held research positions at Stanford Research In -

    stitute. the Institute for Defense Analyses. and

    ESL. Inc. He has been with the Department

    o f

    Electrical Engineering at the University of Utah

    since 1974. He has served as Department Chairman from 1982 to 1985,

    and from

    1988

    to the present. His research interests lie in communication

    theory and signal processing. with current emphasis on multiple-access

    communications. coded modulation. VLSI implementation

    o f

    algorithms.

    and signal restoration.


Recommended