• Aucun résultat trouvé

Convergence study of an iterative joint detector for wavelet packet multiple-access communication

N/A
N/A
Protected

Academic year: 2021

Partager "Convergence study of an iterative joint detector for wavelet packet multiple-access communication"

Copied!
6
0
0

Texte intégral

(1)

September,

1994

LIDS-P 2268

Research Supported By:

AFOSR F49620-92-J-0002

Convergence Study of an Iterative Joint IXtector for Wavelet

Packet Multiple-Access Communication

Learned, R.E.

Krim, H.

Claus, B.

Willsky, A.S.

(2)

September 1994 LIDS-P-2268

CONVERGENCE STUDY OF AN ITERATIVE JOINT DETECTOR FOR

WAVELET PACKET MULTIPLE-ACCESS COMMUNICATION

Rachel E. Learned* Hamid Krim** Bernhard Claus** Alan S. Willsky**

William C. Karl**

*Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA

**Laboratory for Information and Decision Systems

Massachusetts Institute of Technology, Cambridge, MA

This paper also appears in the Proceedings of the By allowing many users to transmit simultaneously in IEEE Signal Processing International Symposium on the same frequency band, we are inducing interference Time-frequency and Time-scale Analysis, Oct. 1994 among users. This user or multiple access inter-ference (MAI) will degrade the performance of conven-ABSTRACT tional receivers, and is, in fact, the major limiting fac-The joint detection of all users in a multiple access tor when the number of users exceeds a threshold. In communication system is known to greatly enhance the the current literature, much attention is being paid to system performance. The optimal joint detector has a overcoming the MAI effects, but, the signal design as-complexity which is exponential in the number of users pect and the receiver design aspect of the MA system and is, therefore, impractical. Suboptimal algorithms are always considered separately.

attempt to achieve near optimal performance with re- Assuming that a single bit is transmitted by each duced computational complexity. The suboptimal joint user within a single time window, the received signal, detection literature deals only with receiver design, al- r, which is the aggregate of each user's transmission lowing for the use of any set of signature waveforms. (plus noise), can be written as

Using the structure of the wavelet packet transform [1]

we are able to choose signal sets and design a detection r Wk + n = Wb + n, () algorithm which results in significantly lower computa- r = n (1)

tional complexity than other proposed suboptimal joint

detectors. The wedding of detector development and where K is the total number of users, bk is either a 1 wavelet packet signal set design, therefore, becomes an or -1 corresponding to a 1 or 0 information symbol interesting problem. Convergence, performance and of the kth user, wk is the kth user's discrete waveform receiver complexity of suboptimal MA detectors cru- represented as a vector, n is an i.i.d., zero mean, Gaus-cially depend upon the signal set structure; it is, thus, sian noise vector, and the following definitions are used:

of paramount importance to study the convergence of b = [b1 b2 . .bK]T, W = [wl w2... wK]. We assume

our iterative algorithm for our signal structure. In this that all relative time shifts are known and incorporated paper, sufficient conditions for the convergence of an in wk.

iterative joint detection scheme are developed. The conventional approach to receiver design is to use a matched filter,

~~~~~~~1.

INTRODUCTION

~bk

= sgn[wTr], (2)

1.

INTRODUCTION

k

A multiple access communication system will typically where sgn represents the signum functional and bk

de-support a large number of users over a given channel. notes the estimated/detected symbol of the kth user.

The work of Rachel E. Learned has been supported by the The conventional matched filter (2) represents the

op-Department of the Air Force contract number F19628-C-90-0002. timal receiver in the case where the MAI is assumed

The work of the other authors has been supported in part by the normal and white. Under this assumption, as users are

Army Research Office under grant by the Air Force Office of added to the system the MAI raises the noise level; this,

Scientific Research under grant number F49620-92-J-0002. The in turn, limits the matched filter performance and,

ul-work of Dr. Claus has also been supported by a research

(3)

signal design aspect of MA is typically restricted to a Without noise, i.e. n = 0, we have r = Wb and our general attempt at minimizing correlation among user first estimate would be

waveforms.

The MAI, however, is not an additive white Gaus- b(1) = sgn[WTWb]. (6) sian noise process; it possesses a great degree of

struc-ture which can be exploited in achieving a greater trans- For obvious reasons we require the true bit vector, b, to mission capacity (e.g. more simultaneous users) than be a fixed point of our iteration, at least in the noiseless the system which uses the conventional detector. The case. In general, b = WTWb. For the special case optimal joint detector (which accounts for the MAI) in which b = WTWb, the user waveforms would be maximizes the log-likelihood function [2] and results in orthogonal and the matched filter would suffice. In the general case (in which users are correlated) we must = arg [ max 2rTWb - (Wb)TWb ]. (3) add (b - WTWb) to the argument of Equation (6) so

bE{1,-1}K that, in the noiseless case, we have

This maximization is over 2K possible b vectors (a com- b = sgn[WTWb + b-WTWb]. (7)

putational complexity that is exponential in IK, the

number of users). This optimal method offers sub- This leads to our iterative detector stantially higher performance than the conventional

de-modulator (2) (e.g. it will afford a relatively larger b(m + 1) = sgn[WTr + b(m) - WTWb(m)], (8) number of users successful utilization of an MA

sys-tem), but is of little practical use on account of its or computational burden [3].

Recent communication literature addresses the gen- bk(m + 1) = sgn[rTwk - wkTwjbj(m)] (9) eral notion of suboptimal joint detection which offers, jik

with minimal performance loss, computational improve- where m denotes the iteration number and b(O) = 0

ment relative to the optimal method while achieving a

significant improvement over the conventional detec-tion (8) reduces to the matched filter es-tor [4, 5, 6]. These approaches only address the re- timate (5) for b(1).

ceiver design problem. The convergence, performance, We offer a simple interpretation of our joint detector and receiver complexity of such suboptimal MA detec- by looking at Equation (8) for noiseless reception, tors, however, crucially depend upon the structure of = Wb,

the signal set W. In light of this, our work in MA + 1) = [(m) + WTW(b (m)) (10) systems couples detection and waveform design.

Our method for waveform design takes full advan- At each iteration, we update the previous estimate with tage of the hierarchical nature of the wavelet packet a correction term which is based on the difference be-transform to control MAI by providing structure that tween the actual bit vector and the previous bit esti-can be exploited in receiver design. Our waveforms mate.

possess a nested-type of correlation structure which is The joint detection procedure defined by Equation (9) well suited for iterative bit estimation. As shown in [7] is similar to a more general algorithm proposed by by using our wavelet-packet-based signature waveforms Varanasi and Aazhang [4].

in lieu of the well known direct sequence spread spec- Commonly, MA systems employ direct sequence spread trum waveforms, a great reduction in computational spectrum (DSSS) or pseudo-noise spread spectrum (PNSS) complexity of other proposed detectors results. user waveforms (sequences) where any single user

expe-2. THE JOINT DETECTOR riences interference from all other users [8]. Figure 1-a shows the cross correlation matrix, WTW, for a set of In the MA scenario described in Equation (1), we ob- 68 pseudo-noise (PN) waveforms in a 64 dimensional serve the signal waveforms space (i.e. 64 samples per waveform dura-r = Wb + n. (4) tion). Each waveform, Wk, was generated by a ran-We wish to derive an iterative algorithm to estimate dom number generator such that wk E {-1, 1}64. We b. We, know that b E {1, -1}K and we use as the first make two observations: 1) when Wk is a pseudo-noise estimate the result from the matched filter detector (2). spread spectrum (PNSS) waveform, wTwj is, in gen-Denoting the first estimate of the bit vector as b(I), we eral, nonzero for all values of j and k, therefore, Equa-have tion (9) must decode the bits of all K users to detect b(1) = sgn[WTr]. (5) a single user's bit; 2) each user experiences the same

(4)

degree of MAI. We note that, typically, the number of users in a DSSS system does not exceed the number of dimensions in the waveform space. Additionally, Gold or Kasami sequences [8] which have been designed to have low cross correlations are typically used. We in-clude this example of the PN waveform set in order to illustrate the general notion of DSSS and the cross correlation structure of PN sequences.

Figure 1-b shows the cross correlation matrix for one wavelet packet signal set in which 68 user wave-forms exist in a 64 dimensional waveform space. (See [7] for the wavelet packet signal set development.) In con-trast to the PNSS observations made above: 1) each of

our wavelet packet waveforms, Wk, is correlated with (a) only a fraction of the signal set; 2) each user

experi-ences a different degree of MAI. We immediately see

that our waveforms offer two advantages in a joint de- .... tection MA system: 1) due to the reduction in the

number of correlated users, a large degree of computa-tional simplification of the joint detector is realized; 2) the hierarchical structure of MAI experienced by each user lends itself to the iterative nature of our algorithm. In the next section we study the convergence of an iterative joint detection algorithm. We set a framework within which wavelet packet multiple access (WPMA) signal optimization as well as joint detection can be considered coincidentally.

3.

STUDY OF CONVERGENCE

(b)

We are interested in the convergence of Equation (10),

the recursive joint detection algorithm for the noiseless Figure 1: WTW displayed as a gray scale image where. case. We rearrange Equation (10) and incorporate the White corresponds to zero and black corresponds to scalar, /A, to allow for speedy convergence. unit magnitude. a) PN sequences b) WPMA

wave-forms b(m + 1) = sgn[b + (/tWTW - I)(b - b(m))]. (11)

A _]T

where = [1, .. , ]T. Letting B diag{b} allows us

Proposition: The optimal convergence speed of the

recursion in Equation (11) is achieved for /u = 2A+B

where A and B are, respectively, the minimum and (b - b(m)) = 2B1e(m). maximum eigenvalues of the matrix WTW.

Further-Let Z = (/~WTW-I) so that we may rewrite equation more, the convergence is guaranteed if as

B < 3A. b(m + 1) = sgn[3Br+ 2ZBe(m)]

Proof: Let e(m) denote the error vector with its jth = 1 sgn[ + 2BZBe(m)], (12)

element defined by where we used the equality 1313 = I. From Equa-tion (12), we see that an error is made, i.e. bk(m + 1)

Ae(m)

_

f

O, ,if bj(m) = bj is incorrect and ek(m + 1) = 1, if

ej(m =

1 , otherwise.

[213ZBe(m)lk <-1.

The error vector indicates which bits are incorrect in the estimate b(m), for m > 1. We set e(O) = 0.5V7,

(5)

comprise a linearly dependent set, but convergence is

II

21BiZBe(m) 11 < v+1, observed in Monte Carlo simulations using the itera-PI 2/3Z/3e(m) 1,

1<

x/P+ tive detector of Equation (10). The goal of future work then b(m + 1) has at most p + 1 incorrect bits and is to find both necessary and sufficient conditions on W to guarantee convergence of a joint detection

al-e(m + 1) 11 /p + 1. gorithm. These conditions will elucidate modifications of the joint detector so that optimal performance is Now, if [b(m + 1) has exactly p + 1 incorrect bits, achieved for any given number of users communicating then within a given time-bandwidth space.

II

e(m + 1) 11= V/P+i

4. CONCLUSION

and we have

The importance of joint detection of all correlated users

I

213Ze(m + 1)

II

< 2 11 3ZB

IBZB

e(m + 1)

II

in a multiple access communication system motivates

= 2 11 BZ 11 1. (13) our research in the area of the coincidental design of user waveforms and joint detection algorithms. The hi-In the next iteration of the estimate, b(m + 2), we erarchical correlation structure of wavelet-packet-derived tolerate, at most, p incorrect bits, i.e. signals appears to be well suited to the development of

iterative joint detectors.

fl

e(m + 2) 11'< p +, In this paper, we set a framework within which wavelet packet multiple access signal optimization as so that the number of bit errors decreases at each step well as joint detection can be considered together. We of the recursion derived one such iterative joint detector and developed

sufficient conditions for its convergence.

·

..

<11

e(m

+

2)

11<11

e(m +

1)11<

. .

REFERENCES

and convergence is insured. Hence, for convergence, we

need [1] R. R. Coifman and M. V. Wickerhauser.

"Entropy-I BSZ <1

based algorithms for best basis selection". IEEE

2 Trans. Inform. Theory, IT-38:713-718, Mar. 1992.

In particular, in order to have optimal convergence "Minimum probability of error for

[2] S. Verdd. "Minimum probability of error for

asyn-speed, we must minimize the norm of (3Z3). We refer . IEEE chronous gaussian multiple-access channels". IEEE here to the matrix norm

Trans. Inform. Theory, 32:85-96, Jan. 1986. C II= max CxH - = IA(c)lmaz, [3] K. S. Schneider. "Optimal detection of code

divi-sion multiplexed signals". IEEE Trans. Aerospace where A(C) denotes the eigenvalue of the matrix C. It Electronic Systems, AES-15:181-185, Jan. 1979.

is easy to show that A(3ZL) = A(Z) and [4] M. Varanasi and B. Aazhang. "Multistage detection 1

Z II= IA(Z)I,,m = max(ltA - 11, tLuB - 11), in asynchronous code-division multiple-access com-munications". IEEE Trans. on Comm., 38, Apr. where A = A,,in(WTW) and B = Amax(WTW), 1990.

0 < A < B < oo. Additionally, the norm of Z is "Linear multiuser detec-2 [5] R. Lupas and S. Verdu. "Linear multiuser detec-minimal if we choose ft = + so that

A+B so thattors for synchronous code-division multiple-access

B-A channels". IEEE Trans. Inform. Theory,

35:123-ZII

IB

+

A

136, Jan. 1989.

It follows that the recursion in (12) is guaranteed to [6] R. Lupas and S. Verdu. "Near-far resistance of mul-converge if tiuser detectors in asynchronous channels". IEEE converge if

Trans. on Comm., 38:496-508, Apr. 1990. B-A

II

Z

II=

B A < 1/2 X B < 3A. 1 [7] R. E. Learned, H. Krim, B. Claus, W. C. Karl, and A. S. Willsky. "Wavelet-packet-based multiple The convergence conditions derived above are suf- access communication". In SPIE on Mathematical ficient, only. In [7], we arbitrarily chose WPMA signal Imaging: Wavelet Applications in Signal and Image

(6)

[8] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications

Figure

Figure  1-b  shows  the  cross  correlation  matrix  for one  wavelet  packet  signal  set  in  which  68  user   wave-forms exist  in a 64 dimensional  waveform  space

Références

Documents relatifs

• Efficace dans 90% des cas (Olson et al, 2000; Schenck et al, 1993 ). • Efficacité complète: 55%,

decay before the TPC and of particles that interact before it) to be reconstructed at DST level using di erent track search algorithms, b) the re tting of previously-found tracks

Such an acquisition leads to a new design of the front-end electronics of the sub-detectors (the muon system modification is not so drastic as for the others) in order to send

The cosmic ray commissioning run at the end of 1998 will be with a complete detector, excepting the Svt, which will be installed in the coil in January, and the DIRC, which will not

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

The mathematical field of large dimensional random matrices is particularly suited for this purpose, as it can provide deterministic equivalents of the achievable rates depending

In this paper, we investigate joint network and channel decoding algorithms for the multiple-access relay channel. We consider a realistic reference scenario with Rayleigh fading

The parameters will be deduced from two independent measurements: gain as a function of grid voltage (section 4) and gain, pressure and temperature as a function time (section