Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Шумов задачи и учебник / [Valeri_P._Ipatov]_Spread_Spectrum_and_CDMA_Princ(Bookos.org).pdf
Скачиваний:
93
Добавлен:
15.04.2015
Размер:
3.46 Mб
Скачать

Spread spectrum systems development

315

 

 

the signatures of all the other users. In some situations such a requirement looks fairly excessive. One of the most typical involvements of synchronous CDMA is the downlink of mobile radio, and making every mobile know all the signatures currently utilized by the other users would complicate the system dramatically. Fortunately, the correlation matrix of the observed process may be estimated experimentally from the observation itself, provided the observation period is long enough. This is the core idea of blind multiuser algorithms. Suppose that ~yi is an N-dimensional row vector of samples at the chip matched filter output corresponding to the data bit number i ¼ 0, 1, . . ..

Then estimate ^ of the observation correlation matrix may be found as:

Ri

 

 

1

 

i

 

 

i

 

1 i 1

 

1

 

 

i

 

 

1

 

 

 

^

 

 

X

 

 

 

 

X

 

 

 

 

 

 

^

 

 

 

 

 

 

 

 

 

T

 

 

 

 

 

 

 

T

 

 

T

 

 

 

 

 

T

 

Ri ¼

i þ 1

t

¼

0 y~t

y~t ¼

i þ 1

 

i

t

¼

0 y~t

y~t þ

i þ 1

y~i

y~i ¼

i þ 1

Ri 1 þ

i þ 1

y~i y~i

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Therefore, it is possible to compute

^

in a recurrent way: as soon as the portion of

Ri

observation samples spanning the new bit arrives, it is used to update the estimate

^

Ri.

After this

the

result

is substituted

in

(10.20) to

find the current

 

reference

as

2

^ 1

 

 

 

 

 

 

 

 

 

 

 

~T

 

 

 

 

 

 

 

 

 

ui ¼ A1a1Ri

, calculating from (10.14) &1 ¼ uiyi , and the decision on the ith bit accord-

ing to (10.23). Variations and advancements of blind multiuser algorithms are plentiful and may be found in the literature (see [19,100,101] and their bibliographies).

10.1.5 Interference cancellation

One can construe the low-complexity of both decorrelating and MMSE detectors by the fact that they exploit a single-user philosophy, i.e. a linear operation of multiplying the observation vector ~y by a mismatched reference vector u. The interference cancellation strategy is again based on a conventional receiver, supplemented by a loop of subtraction of MAI terms from the output effect (10.7). Suppose that the first user receiver knows the signatures and amplitudes of all users and one way or another has

^ ^ . . . ^

obtained estimates b2, b3, , bK of data bits of the side users. Then one is capable of regenerating all side user signals, subtracting their sum from the observation y(t) and utilizing the result as an input (presumably free of MAI) to the conventional receiver. Certainly, the efficiency of such a detector will dramatically depend on the reliability of knowledge of side signal amplitudes and the accuracy of estimates of side user bits. Among others, the multistage procedure is widely discussed in the literature [19,102]. Its first stage involves successive estimates of user bits transferring from the stronger to weaker signals, and using the already estimated k 1 user bits to remove corresponding MAI terms when estimating the kth user’s bit. After all K bits are estimated by so doing the procedure runs the next stage, where all the same operations are repeated. This time, however, the receiver’s knowledge on MAI is richer compared to the previous stage, and subtraction of the recreated MAI starts from the very beginning, i.e. estimating a bit of the strongest user. Stages like this are iterated as many times as is wished, each starting with an updated MAI recreation and continuing to refine it during the course of user bit pattern estimation. When one or another terminating criterion is met, the procedure outputs the final estimate of the bit of the user of interest.