An Effective Multiuser Detection Scheme - wseas

0 downloads 0 Views 647KB Size Report
on Multiuser Detection Scheme for MFSK/FH-SSMA Systems ... multiple access (MFSK/FH-SSMA) system over a cochannel interference scenario is dependent ...
WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

An Effective Cancellation Technique of Cochannel Interference Based on Multiuser Detection Scheme for MFSK/FH-SSMA Systems JYH-HORNG WEN1, CHUAN-WANG CHANG2,3,* and SHENG-FONG LIN2 1 Department of Electrical Engineering, Tunghai University 2 Department of Electrical Engineering, National Chung Cheng University 3 Department of Electrical Engineering, Chien Kuo Technology University No. 1, Chieh Shou N. Rd., Changhua City, Taiwan, R.O.C. TEL:+886-4-7111111 Ext.3234 Email: [email protected] *Correspondence address

Abstract: - The performance of a multilevel frequency shift keying/frequency hopping-spread spectrum multiple access (MFSK/FH-SSMA) system over a cochannel interference scenario is dependent on multiuser detection schemes. Many investigations have demonstrated huge potential capacity and performance improvement by using multiuser detection schemes. However, their schemes are extremely complex while the total number of users is increased because the multiuser interference becomes larger. In this paper, we propose a novel multiuser detection scheme to reduce the complexity of decoding process. The performance of the system with the proposed scheme over a nonfading channel is simulated and compared with that of conventional and other multiuser interference cancellers. Simulation results show that the proposed scheme reduces the system complexity and improves the bit error rate (BER). Key-Words: - Multilevel Frequency Shift Keying (MFSK), Frequency Hopping-Spread Spectrum Multiple Access (FH-SSMA)

Frequency diversity is achieved by applying an FH

1. Introduction in

pattern onto a data pattern and is obtained to

communication systems, such as DS-SSMA [1]-[3]

mitigate multipath and diversity of the interferences

and FH-SSMA[4],[5], permit many simultaneous

as seen by any given user [6], [7]. However, the user

users to share a single transmission medium through

capacity in FH-SSMA systems is hampered by

the assignment of unique codeword or hopping

multiuser cochannel interference (CCI). The term

pattern to each user, respectively. Nevertheless,

“CCI”, or named “hit”, occurs when more than one

unlike in DS-SSMA where the data bandwidth is

users’ tones occupy a specific frequency slot at the

spread by direct modulation with a wideband

same time. An MFSK/FH-SSMA system was

spreading code, the spreading code in FH-SSMA is

proposed by Goodman [7] to reduce the effect of

used to control the sequence of carrier frequencies.

hits.

The

spread

ISSN: 1109-2742

spectrum

techniques

248

In

addition,

by

properly

designing

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

frequency-hopping patterns, CCI can also be

2. System Description

minimized as few as possible. Various kinds of

In an MFSK/FH-SSMA system, there are M

address code sets have been studied [8].

pairs of transmitters and receivers. Fig. 1 shows the

For MFSK/FH-SSMA systems, Mabuchi et al.

block diagram of one transmitter. In the transmitter,

proposed a multiuser detection scheme based on

every k bits of the input binary data are stored in a

canceling CCI [9]-[14]. In the scheme, the receiver

k-bit buffer. The k-bit message is then mapped into a

decodes all users’ candidate data symbols jointly

symbol selected from one integer of the set

and then these symbols are utilized to produce the

{0,

estimates of the received data matrix. By using the

user, where K=2k . The symbol xm with symbol

maximum likelihood decision rule, the matrix that

duration of Ts is subdivided into L chips and then

has the most number of coincident entries with the

the vector Xm = ( Xm,0, Xm,1,…, Xm,L-1 ) is produced,

received data matrix is selected. A modified

where Xm,i = xm for i = 0, 1,…, L-1. Fig. 2 shows an

Mabuchi scheme was proposed by Lin et al. [15],

instance of the encoding procedure, where the data

which further improved the system performance.

vector X1 = (3, 3, 3, 3, 3) is showed in the matrix

However, these two schemes are unacceptable in

representation for K = 8 (k = 3) and L = 5. Each

many applications because of their huge amount of

element of the resulting vector Xm is then translated

computational complexity especially when the total

in frequency by an amount that is determined by the

number of users increases in the system. Therefore,

corresponding element of hopping sequence Rm,

another scheme based on modification of Mabuchi’s

where Rm is generated by different address element

scheme was proposed by us to improve the system

γm(m=1,2,…, M) selected from GF(K). The symbol

complexity [16]-[19]. Furthermore, an effective

GF(K) denotes the finite field (Galois field) of K

interference cancellation algorithm that we proposed

elements. Let the address (hopping) pattern of user

will get outstanding performance especially in

m be denoted by a vector

nonfading environments.

1, 2," , K − 1} and denoted by xm for the mth

R m = ( Rm,0 , Rm,1 , " , Rm, L −1 )

The rest of this paper is organized as follows.

(1)

In Section 2, a novel multiuser detection scheme

where Rm,i ∈ GF(K) represents the frequency

used in MFSK/FH-SSMA systems is proposed to

channel occupied by the address at time slot i. With

cope with the increasing complexity resulting from

the addition operator denoted by “♁”, we will

the augmentative number of active users. The

derive the encoded data pattern Ym by imposing the

algorithm here gives a new method in choosing the

hopping pattern Rm upon the data pattern Xm. That is,

candidate rows that will dramatically reduce the

the vector Ym = (Ym,0, Ym,1, … , Ym,L-1) transmitted by

complexity of the system. In Section 3, the

user m can be derived from Ym=Xm+Rm, where Ym,l,

numerical analysis of the complexity of this system

Xm,l, and Rm,l ∈ {0, 1, 2, …, K-1}. The addition rule

is carried out. In Section 4, computer simulations for

denoted by “♁” here is exclusive-OR (XOR)

various kind of schemes in the MFSK/FH-SSMA

addition (the addition is operated after Rm and Xm

system will be carried out and the results of them

are transformed into binary digits). As a result, the

will also be discussed. Finally, in Section 5, the

center frequencies of the data pattern elements are

main results of this paper are summarized.

changed (hopped) by the elements of the hopping pattern. The matrix representation of Y1 in Fig. 2

ISSN: 1109-2742

249

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

shows an example of the output of the frequency

Proposition 2: In the decoded matrix, any two

synthesizer derived from the hopping pattern R1 =

frequency tones selected arbitrarily

(4, 3, 6, 7, 5) and the data symbol pattern X1 = (3, 3,

from L tones of the same undesired

3, 3, 3).

user are different. The proof of this proposition will be presented in

Without loss of generality, it is assumed that

Appendix.

user 1 is the desired user and the others are the undesired ones to CCI. Moreover, it is assumed that

There is an important concept concealed in

the FH patterns of all users are known and are

proposition 2, where it exhibits each tone in an

distinct to each other.

incorrect row must comes from different users in the decoded matrix. That is, all the undesired users will at most contributes one of its tones to a specific

2.1. Address Code Assignment

incorrect row. The concept showed above will

In this section, we briefly review the method of

provide an important idea of “PO row”.

hopping pattern assignment and invoke some propositions

to

show

the

properties

of

the

transmission patterns. In order to make the detection

2.2. A Novel Multiuser Detection Algorithm Based on Mabuchi’s Scheme for MFSK/FH-SSMA System

precisely, the address pattern sets having good cross-correlation properties must be found. From the results presented in [8], it has been shown that the

In this section, a novel decoding algorithm for

code set constructed by Einarsson is the optimal one

multiuser detection scheme is proposed to improve

for the MFSK/FH-SSMA system [6].

the complexity of the MFSK/FH-SSMA system. Fig.

Let the address pattern of user m be denoted by

3 shows the receiver structure of the proposed

the vector Rm. Einarsson [6] proposes the following

scheme. As we know, two previous works on

equation to generate a set of K addresses.

multiuser detection schemes proposed by [9] and

R m = (γ m , γ m β , γ m β 2 , " , γ m β L −1 ) ,

[14] will generate great amounts of candidate

(2)

matrices as the number of the active users increases.

where γm is an element of GF(K) assignment to user

For the reason, the algorithm we proposed will

m and β is a fixed primitive element of GF(K). To

focus on the reduction of the number of candidate

see what transmitted signals Ym(m=1,2,…,M) can

matrices. In our scheme, the majority rows would be

interfere with each other, properties of the pair of

selected as the candidate rows of the desired user,

transmitted sequences are enumerated as follows.

while on the other side, the row named “PO row”

Let Y1 and Y2 denote two sequences generated by

(Pseudo-Optimal row) would be respectively chosen

two different hopping sequences R1 and R2,

for the other users in their decoded matrices. The

respectively. It is noted that the properties showed

algorithm of the proposed multiuser detection

next are all based on the word synchronous system.

scheme

Proposition 1: With appropriate choice of β, two

summarized as follows:

transmitted vectors with different

the

MFSK/FH-SSMA system is

2.2.1. Firstly, the receiver detects the energy in each

address will coincide in at most one

time-frequency cell of the received matrix.

chip [6].

ISSN: 1109-2742

for

The energy in each cell is the summation of

250

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

transmitted tones from all active users. Fig. 4

user, all the L tones of the user for decoding

shows an example where K = 8, L = 3 and M

will appears in the correct row in nonfading

= 5.

environments.

the number of interference user increases, it

symbols of each user in Fig. 4 (d). In the

is not necessarily that the correct row is

desired user’s (user 1) decoded matrix D1, are

considered

property

row” among the K rows. Nevertheless, when

5) and then choose the candidate of the data

rows

two

that has the most chances to become the “PO

symbols by the FH patterns Rm (m= 1, 2, …,

majority

the

described above, the correct row is the one

2.2.2. The receiver decodes every user’s data

the

From

always the “PO row”, the name “Pseudo” is

as

thus applied.

candidates of the correct data symbol in the desired user’s decoded matrix. While in the

2.2.5. Let Jm (1≤ Jm≤K) denote the number of the

other users’ decoded matrix, the “PO row” is

candidate rows decoded by the hopping

selected as candidates of the correct data

pattern Rm. Therefore, when in the receiver of

symbol. The reason for the choice of

user 1, J1 means the number of majority rows

majority row instead of “PO row” in the

and Jm (m≠1)

desired user’s decoded matrix is to enlarge

decoded matrix, respectively. Each candidate

the probability of selecting the correct row.

of the desired user’s data symbols is

Fig. 4 (d) shows the decoded matrices of

re-encoded and added with the candidate of

users derived from the hopping patterns Rm

the other users’ data symbols using the

(m= 1, 2, …, 5) and the received matrix in

“energy SUM“ operation. Since each time we

Fig. 4 (c).

select one candidate row from each user,

means the PO rows in the mth

M

∏ Jm candidate matrices

there are total

2.2.3. Definition of PO row: A row which satisfies

m=1

the following two conditions is named as the

generated from this procedure. The example

“PO row”, the first condition is that the row is

in Fig. 4 (d) shows that there are two

a complete row (majority row) and the

candidates for the data symbols of users 1

second is that this complete row must be the

and one candidate for the data symbols of the

row having the largest energy among the K

other three users. Therefore, there are total

rows. The name “PO row” is denominated by

two candidate matrices, “t2” and “t4”,

us and is of the full name “Pseudo Optimal

derived from the “sum” operation of each

row”. This is because in most of the situations,

re-encoded

the row belonging to the “PO row” is

matrix

generated

from

the

combination of candidate rows. Nevertheless,

generally the correct data row.

there are four candidate matrices in the

2.2.4. The reason for choosing the PO row: From

Mabuchi’s scheme.

proposition 2, one interference user will at M

2.2.6. Among these ∏ Jm candidate matrices, we

most contribute one tone out of its L tones to

m=1

a specific row. Moreover, owing to the

choose the one that has the most number of

matched dehopping pattern for the desired

ISSN: 1109-2742

coincident cells with the original received

251

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

considered.

matrix. In other words, the energy of each cell in the candidate matrix is the same with

Since Jm (1≤ Jm≤K) denote the number of the

that in the original received matrix, and the

candidate rows (complete rows) decoded by the

number of the cells is the maximum. Finally,

hopping pattern Rm. In both of the multiuser

the correct data symbol of the desired user

M

detection schemes in [9] and [14], there are ∏ Jm

would be extracted. In Fig. 4 (e), the fourth

m=1

candidate matrix named “t4”, which consists

(1≤ Jm≤K) candidate matrices of received matrix in

of data symbols (7, 5, 3, 2, 2) extracted from

each scheme. The symbol Ncandi is defined as the

each decoded matrix, is the one that has the

number of the candidate matrices normalized by the

most number of coincident cells with cells of

number of symbols per user [9] and is used to

the

measure the system complexity.

received

matrix

in

Fig.

4

(c).

Consequently, we can decode the correct data N candi =

symbol “7” of the desired user (user 1) from

Number of total candidate matrices Number of total symbols per user

.

(2)

the selected candidate matrix “t4”. On the contrary, there are four candidate matrices

In the following, theoretical analysis will be

generated in the Mabuchi’s scheme and

established. Firstly, the independence between all

random choice between the matrices “t2” and

the decoded matrices is assumed. A tight bound

“t4” would be applied. Finally, a decoding

proposed by [6] derives the probability that an

error in the Mabuchi’s scheme happens.

incorrect row to be evolved into a complete row. Thus, in each of the decoded matrix, the probability

In this example, we have shown that the

for an incorrect row to become a complete row is

proposed scheme can decode the correct data symbol even when the errors will occur in the

Pcmp =

Mabuchi’s scheme.

1 M −1− i ⎤ ⎡ ) Π ⎢ 1 − (1 − ⎥. i= 0 K −i ⎣ ⎦ L −1

(3)

Over the K-1 incorrect rows, the probability that exactly q unwanted rows belong to the complete

3. Performance Analysis of System Complexity

rows is ⎛ K − 1⎞ P( q) = ⎜ ⎟ ⎡⎣ Pcmp ⎤⎦ ⎝ q ⎠

3.1. The Number of Candidate Matrices in Mabuchi’s Scheme

⎡⎣1 − Pcmp ⎤⎦

K −1− q

.

(4)

The mean value concerning the average number of

In this subsection, the number of candidate

incorrect complete rows in a decoded matrix is

matrices generated in the decoding process of

defined and expressed as

Mabuchi’s and Lin’s scheme is analyzed (it is the

__ K −1 ⎧⎛ K −1⎞ q K −1−q ⎫ J m = Σ q ⋅ ⎨⎜ ⎬. ⎟ ⎡⎣ Pcmp ⎤⎦ ⎡⎣1 − Pcmp ⎤⎦ q= 0 q ⎠ ⎩⎝ ⎭

same in both schemes). The analysis here assumes time and frequency synchronization of the FH pattern generator in the transmitter and receiver.

(5)

Finally, through the multiplication of all the number

Hop synchronous is also assumed. The situation

of candidate matrices in each decoded matrices, the

where there is no noise or fading in the system is

ISSN: 1109-2742

q

averaged number of candidate matrix is derived as

252

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

scheme and the Lin’s scheme in a non-fading

M

____ __ ⎞ ⎛ N candi = ⎜ 1 + J m ⎟ . ⎜ ⎟ ⎝ ⎠

channel. For instance, given nine users, Pb(M) =

(6)

3.11×10-6

= 4.06×10-2 for the conventional receiver,

It is noted that the number “1” in equation (6)

Pb(M) =

-3

5.7×10 for the Mabuchi’s canceller, and Pb(M) =

represents the correct complete row which occurs

2.8×10-5 for the Lin’s canceller. Noted that, as the

inevitably in interference only channel.

number of active users M increases, the bit error rates (BER) of the Mabuchi’s scheme, the Lin’s

3.2. Reduction Efficiency of System Complexity

scheme and the proposed scheme approach the bit error rate of the conventional scheme. This is

In this subsection, a parameter η is defined to

because there are too many ambiguous candidates in

measure the degree of complexity reduction. The

the decoded matrix, which dramatically decreases

reduction efficiency of the system complexity is

the probability of correct decisions in all schemes.

defined as

η=

for the proposed canceller, while Pb(M)

Fig. 5 reveals that when the BER is fixed at 10-3,

( N ) Mabuchi − ( N ) Proposed ( N ) Mabuchi

there are 6 users supported by the conventional ,

scheme, 8 users in the Mabuchi’s scheme and 12

(7)

users in both the Lin’s and the proposed schemes. The result shows that high traffic load is admitted in

where N is the average candidates (candidate rows

the proposed scheme under a fixed value of BER.

or matrices per symbol, per user) in the process of decoding.

4.2. Analysis of System Complexity In this subsection, the system complexity of the system using the proposed CCI canceller is

4. Numerical and Simulation Results

compared with the Mabuchi’s CCI canceller. The

In this section, the presented numerical results

analysis in this subsection is concentrated on the

are evaluated for various values of system

number of candidate rows and matrices. Moreover,

parameters K, M and L. To better illustrate, the

in the conventional scheme, none of the candidate

results will be presented into two parts: “analysis of

matrices will be generated. Fig. 6 shows the number

bit error rate” and “analysis of system complexity”.

of candidate matrices Ncandi versus the number of active users M in log scales for the two schemes: the

4.1. Analysis of Bit Error Rate

Mabuchi’s canceller in [9], and the proposed

In this section, the performance of the system

receiver. The number of the candidate matrices was

using the proposed CCI canceller is compared with

with K=16 and the hopping pattern length L=5. As

those systems using the conventional, the Mabuchi’s

expected, the value Ncandi in the Mabuchi’s receiver

and the Lin’s CCI canceller. Fig. 5 shows the bit

increases nonlinearly as M increases. On the

error probability versus the number of active users

contrary, the value Ncandi increases almost linearly in

for the four schemes K=16 and L=5 without fading.

the proposed receiver as M increases. Besides, the

As expected, the proposed scheme performs better

numerical and simulated results of Ncandi in the

than the conventional scheme, the Mabuchi’s

ISSN: 1109-2742

Mabuchi’s scheme will also be compared. From this

253

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

figure, it is shown that these two curves are most of

generality, we assume that user 1 is the desired user.

the time coincidence in values. Table. 1 shows the

For the mth user(m≠1), we have Ym=Rm+Xm·1. After

detail values of the number of candidate matrices for

decoding by the hopping pattern of the desired user,

the Mabuchi’s scheme and the proposed scheme,

the frequency position at the ith chip of the mth user

and the reduction efficiency of these two schemes is

is

also calculated. As shown in Table 1, when the

Ym ,i − R1,i = (γ m − γ 1 ) β i −1 + xm .

number of active users M is greater than 11, the

(8)

reduction efficiency η will attain more than the percentage of ninety. Moreover, the reduction

Now consider the next symbol Ym,j-R1,j at chip

efficiency increases as the number of active users

position j, where j≠ i. We have

increases.

Ym, j − R1, j = (γ m − γ 1 ) β j −1 + xm .

Finally, Fig. 7 shows the complexity reduction

(9)

efficiency η versus the number active users M for the candidate matrices and candidate rows in a

If we assume equation (8) is equal to equation (9),

non-fading channel. From the results in this figure,

then we will derive

it can be observed that in spite of the reduction

β i −1 = β j −1 .

efficiency of candidate rows is not large, the

(10)

efficiency is almost reaches to the percentage of 100 as the number of active users M approaching to K.

The result derived in equation (10) conflicts with the finite field rule described in [20], where the conditions to the orders i, j of

β

meets i, j ≤ L

and L ≤ K-1. That is, any two frequency tones

5. Conclusions

selected from L tones of the same undesired user are

This paper developed a novel algorithm for the

different in the decoded matrix.

multiuser detection schemes to decrease system complexity in MFSK/FH-SSMA systems. The performance of the system has been analyzed and

Acknowledgment. This work was supported by the

compared with those of conventional the Mabuchi’s

National Science Council (Taiwan) under grant NSC

and the Lin’s CCI canceller. Simulation results show

98-2218-E-029 -004 -.

that the proposed scheme has much lower system complexity than the two multiuser detection

References:

schemes proposed by Mabuchi and Lin. Moreover,

[1]

C. Pateros, “Novel direct sequence spread spectrum

the bit error probability of the proposed scheme also

multiple access technique,” IEEE 21st Century Military

outperforms

Communications Conference Proceedings, vol. 1, pp.

the

other

detection

schemes

in

nonfading channels.

564-568, Oct. 2000. [2]

Y.K. Jeong, J.H.Cho, and J.S. Lehnert, “An asymptotic analysis of band-limited DS/SSMA systems,” IEEE

Appendix:

International Symposium on Information Theory, pp. 434,

In this section, the proof of the proposition 2 in

July. 2004.

section 2 will be presented. Without loss of

ISSN: 1109-2742

[3]

254

Yeon Kyoon Jeong, Joon Ho Cho, and J.S. Lehnert,

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

[4]

[5]

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

“Performance bounds on chip-matched-filter receivers for

of interference for direct-sequence spread-spectrum

bandlimited DS/SSMA communications,” IEEE Trans.

multiple-access system,” IEEE J. Select. Areas Commun. ,

Commun., vol. 53. , no. 1, pp.131 –141, Jan. 2005.

vol. SAC-8, pp. 675-682, May 1990.

J.F.

Weng,

G.Q.

Xue,

Tho

Le-Ngoc,

and

S.

[13] R. Kohno, H. Imai, and M. Hatori, and S. Pasupathy, “An

Tahar, ”Analysis of multilevel-quantized soft-limiting

adaptive

detector for an FH-SSMA system,” IEEE International

spread-spectrum multiple-access communication networks

Conference on Communications, vol. 3, pp. 1380-1384,

in a power line,” IEEE J. Select. Areas Commun. , vol.

Jun. 2000.

SAC-8, pp. 691-699, May 1990.

Daeyoung Park, G.L. Byeong, “Iterative decoding in convolutionally systems,”

and

IEEE

turbo

coded

International

[7]

[8]

G.

Einarsson,

“Address

cochannel

interference

for

MFSK/FH-SSMA

algorithm for M-ary frequency shift keying signals,” IEEE

Conference

21st

on

assignment

Century

Military

Communications

Conference

Proceedings, vol. 2, pp. 1123-1128, oct. 2004.

for

a

[15] S.-Y. Lin, G.-C. Yang, S.-C. Tseng, and C.F. Hong,

time-frequency-coded, spread-spectrum system,” Bell Syst.

“Improved

Tech. J., vol. 59, no. 7, pp. 1241-1255, Sep. 1980.

MFSK/SSMA systems,” IEEE J. Select. Areas Commun.,

D.J.

Goodman,

P.S.

Henry,

and

V.

K.

Prabhu,

cochannel

interference

cancellation

for

vol. 17, no. 11, pp. 1940-1952, Nov. 1999.

“Frequency-hopping multilevel FSK for mobile radio,”

[16] H. Zhang, H. Yang, R. Luo, H. Wang, “Improved

Bell Syst. Tech. J., vol. 59, no. 7, pp. 1257-1275, Sep.

multiuser detector for fast FH/MFSK systems with

1980.

soft-limiter,”IEEE 2005 Int. Symposium on Microwave,

B.G. Haskell, “Computer simulation results on frequency

Antenna, Propagation and EMC Technologies for Wireless

hopped MFSK mobile radio-noiseless case,” IEEE Trans.

Commun., Vol 2, pp. 1464 – 1467, Aug. 2005.

Commun., vol. com-29, no. 2, pp.125 –132, Feb. 1981. [9]

of

[14] Y. Zaihe, Y.Q. Shi, and S. Wei, “A practical classification

Communications, vol. 9, pp. 2784-2788, Jun. 2001. [6]

canceller

[17] Z. Yu, C.C. Chai, T.T. Tjhung, “Multiuser detection

T. Mabuchi, R. Kohno and H. Imai, “Multiuser detection

algorithm based on iterative interference cancellation for

scheme based on canceling cochannel interference for

MC-MFSK systems,” Personal, Indoor and Moible Radio

MFSK/FH-SSMA system,”

IEEE

J.

Select.

Areas

Communications, IEEE 2004 PIMRC, vol. 4, pp. 2915 –

Commun., vol. 12, no. 4, pp. 593-604, May 1994.

2919, Sep. 2004.

[10] R. Kohno, H. Imai, and M. Hatori, “Cancellation

[18] Z. Yu, T.T. Tjhung, C.C. Chai, “Performance of

technique of cochannel interference in asynchronous

MC-MFSK systems with IIC-based multiuser detection

spread spectrum multiple access system,” Trans. On The

over

Institute of Electronics, Information and Communication

Telecommunications Conference, vol. 2, pp. 893-897, Dec.

Engineerings Japan, vol. J65-A, no. 5, pp.416-423, May

2004.

1983.

Rayleigh

fading

channels,”

IEEE

Global

[19] S. Ahmed, L.L. Yang, L. Hanzo, “Successive Interference

[11] S. Verdu, “Optimum multiuser asymptotic efficiency,”

Cancellation in Clipped and Product Combining aided

IEEE Trans. Commun., vol. COM-34, pp. 890-897, Sept.

FFH Multi-User Systems,” IEEE Vehicular Technology

1986.

Conference, vol. 5, pp. 2188-2192, Spring 2006. [20] B. W. Stephen, Error Control System for Digital

[12] R. Kohno, H. Imai, and M. Hatori, and S. Pasupathy,

Communication and Storage, NJ: Prentice Hall, 1995.

“Combination of an adaptive array antenna and a canceller

ISSN: 1109-2742

255

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Binary Data Buffer k-bits

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

XOR Addition

Transform to K levels

X1



Y1

Energy Detector

Frequency Synthesizer

Hopping B 1 Sequence R1

Delay



Choose Majority rows

Address Pattern R1

Com parison



Sum

Data Decision

Transform to Binary

Binary Data

Address Pattern R1 . . .

Fig. 1



Block diagram of an MFSK/FH-SSMA

Address Pattern R1

transmitter ♁

Choose P.O. rows

Address Pattern R2

Address Pattern R2

Data Matrix X1 = (3,3, 3,3,3)

7 6 5 4 3 O O O O O 2 1 0 Tc

TS = LTc

FH Code Matrix

R1 = (4,3,6,7,5), γ 1 = 4

7 O 6 O 5 O 4 O 3 O 2 1 0

TS



. . .

Encoded Data Matrix Y1 = (7, 0, 5, 4, 6)



7 O 6 O 5 O 4 O 3 2 1 0 O

. . . ♁ Address Pattern RM

TS

Choose P.O. rows

Address Pattern R2

♁ Address Pattern RM . . .

♁ Address Pattern RM

Fig. 2 An example of the encoding procedure for an MFSK/FH-SSMA transmitter

Fig. 3

The receiver structure of the proposed scheme for the MFSK/FH-SSMA system

ISSN: 1109-2742

256

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

1e+0 ○○ ○

1e-1

Bit error probability

1e-2

◇◇ ◇

1e-3 1e-4 K= 16, L= 5, interference-only

1e-5

conventional scheme (analytical) conventional (simulation) Mabuchi's scheme (analytical) Mabuchi's scheme (simulation) Lin's scheme (analytical) proposed scheme (simulation)

1e-6 1e-7 ○

1e-8 ○

4



6

8

10

12

14

16

Active users M



Fig. 5



BER versus the number of active users M using



the



conventional

canceller,

the

Mabuchi’s

◇ ○

canceller, the Lin’s canceller, and the proposed canceller in a non-fading channel ◇ ◇ ○ ○ ○ ○○





◇ ◇ ○ ○

◇ ◇ ○ ○

◇ ◇





○ ○ ○ ○ ◇

◇ ◇ ○

◇ ◇◇○ ○ ○







○ ○◇

1e+5 Mabuchi's scheme (simulation) Mabuchi's scheme (analytical) Proposed scheme (simulation)

1e+4 ◇







○ ◇

◇ ○ ○ ○







○ ○



K= 16, L= 5, interference only





Ncandi (log scale)





○ ◇ ○

◇ ○

1e+3

1e+2

1e+1

1e+0

Fig. 4 An example of decoding procedures proposed by

1e-1 4

us

6

8

10

12

14

16

Active users M

Fig. 6

The number of candidate matrix

Ncandi (per

symbol, per user) versus the number of active users M using the Mabuchi’s canceller and the proposed canceller in a non-fading channel

ISSN: 1109-2742

257

Issue 4, Volume 9, April 2010

WSEAS TRANSACTIONS on COMMUNICATIONS

Candidate matrices Candidate rows (not for the desired user)

100

Complexity reduction efficiency η

Jyh-Horng Wen, Chuan-Wang Chang, Sheng-Fong Lin

K= 16, L= 5, interference only 80

60

40

20

0 2

4

6

8

10

12

14

16

Active users M

Fig. 7

The complexity reduction efficiency η versus the number active users M in a non-fading channel, where the efficiency η is defined in equation (7)

Reduction Efficiency

Active users M

Mabuchi’s Scheme

Proposed Scheme

5

1

1

0

6

1.011

1.004

0.673

7

1.06

1.018

4.16

8

1.23

1.056

14.05

9

1.69

1.135

33.01

10

3.10

1.278

58.71

11

8.50

1.529

82.01

12

45.75

1.969

99.69

13

367.7

2.657

99.28

14

2604.5

3.86

99.85

15

20584.8

5.849

99.97

η

Table. 1 The number of the compared candidate matrices and the reduction efficiency (K = 16, L = 5,non-fading channel)

ISSN: 1109-2742

258

Issue 4, Volume 9, April 2010

Suggest Documents