Efficient blind MAI suppression in DS/CDMA systems by embedded constraint parallel projection techniques

Masahiro Yukawa, Renato L.G. Cavalcante, Isao Yamada

Research output: Contribution to journalArticle

32 Citations (Scopus)

Abstract

This paper presents two novel blind set-theoretic adaptive filtering algorithms for suppressing "Multiple Access Interference (MAT)," which is one of the central burdens in DS/CDMA systems. We naturally formulate the problem of MAI suppression as an asymptotic minimization of a sequence of cost functions under some linear constraint defined by the desired user's signature. The proposed algorithms embed the constraint into the direction of update, and thus the adaptive filter moves toward the optimal filter without stepping away from the constraint set. In addition, using parallel processors, the proposed algorithms attain excellent performance with linear computational complexity. Geometric interpretation clarifies an advantage of the proposed methods over existing methods. Simulation results demonstrate that the proposed algorithms achieve (i) much higher speed of convergence with rather better bit error rate performance than other blind methods and (ii) much higher speed of convergence than the non-blind NLMS algorithm (indeed, the speed of convergence of the proposed algorithms is comparable to the non-blind RLS algorithm).

Original languageEnglish
Pages (from-to)2062-2071
Number of pages10
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE88-A
Issue number8
DOIs
Publication statusPublished - 2005 Aug
Externally publishedYes

Keywords

  • Adaptive projected subgradient method
  • Blind MAI suppression
  • DS/CDMA system
  • Linearly constrained algorithms

ASJC Scopus subject areas

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Efficient blind MAI suppression in DS/CDMA systems by embedded constraint parallel projection techniques'. Together they form a unique fingerprint.

  • Cite this