Paper Menu >>
Journal Menu >>
![]() Int. J. Communications, Network and System Sciences, 2010, 3, 767-772 doi:10.4236/ijcns.2010.39102 Published Online September 2010 (http://www.SciRP.org/journal/ijcns) Copyright © 2010 SciRes. IJCNS An Efficient Noisy-ICA Based Approach to Multiuser Detection in IDMA Systems Abdelkrim Hamza1,2 , Salim Chitroub1, Gérard Salut2 1LCPTS Laboratoire de Communication et du Traitement du Signal, FEI-USTHB, Alger, Algeria 2Laboratoire d’Analyse et d’Architecture des Systèmes-CNRS;LAAS, F-31077 Toulouse, France E-mail: ahamza@usthb.dz Received July 3, 2010; revised August 7, 2010; accepted September 5, 2010 Abstract Interleaved Division Multiple Access (IDMA) is a new access scheme that has been proposed in the literature to increase the capacity of wireless channels. The performance of such systems depends on the accuracy of the channel state information at the receiver. In this paper, a Noisy-Independent Component Analysis (N-ICA) based IDMA receiver for multiple access communication channels is proposed. The N-ICA com- ponent is applied as a post processor. Unlike other IDMA receivers, the proposed scheme detects and separates the transmitted symbols without channel state information tracking. The performance of the proposed tech- nique is presented in terms of raw bit error rate (BER) without channel coding for different signal to noise ratios (SNR). Simulation results demonstrate that N-ICA post processor provides an improvement in perfor- mance in BER in loaded systems. When the system is not loaded, the proposed post processor has the same performance as conventional IDMA receiver with less iterations leading to a complexity reduction. Keywords: IDMA, ICA, Multi-User Detection 1. Introduction One of the challenges of next generation wireless sys- tems is the spectral efficiency. The goal is to provide sufficient quality and capacity to the diverse and rich multimedia content that need to be transmitted. Recently proposed Interleave-Division Multiple-Access (IDMA) communication system is one of the most promising technologies for high data rate wireless networks [1]. IDMA can be regarded as a special case of Code Divi- sion Multiple Access (CDMA). In CDMA systems, users are separated using signatures or spreading codes; while in IDMA systems, distinct interleavers are employed to separate users [2]. At the receiver of IDMA system, the signal of the user of interest needs to be extracted out of the Multiple Access Interference (MAI) and the Inter Symbol Interfe- rence (ISI). Moreover, since conventional IDMA detec- tor is sensitive to channel estimation errors [3], a good channel tracking algorithm is mandatory. This might drastically increase the overall complexity at the receiver. To overcome those drawbacks, in this paper, we propose a new blind receiver for IDMA systems. In our approach, a noisy Independent Component Analysis (N-ICA) scheme is introduced as a post processor. Independent Component Analysis (ICA) has attracted special attentions in the wire- less communication fields for interference suppression of CDMA systems [4,5]. In this paper, we propose to detect and separate the transmitted symbols without channel tracking and by in- cluding the noise in the global model; leading to the N-ICA model. We will show that our model is very suitable for symbol detection and separation in the IDMA context. In terms of complexity, as a post processor, the proposed solution starts the processing just after conventional IDMA processing. In this case, a hardware reuse is possible if an FPGA implementation is carried on for example (currently being finalized). Therefore, the proposed N-ICA block does not represent a complexity increase in the overall system. The remainder of this paper is organized as follows. The next section is devoted to the IDMA system model. In Sec- tion 3, we detail the proposed N-ICA model for IDMA. In Section 4, an estimation algorithm is presented for N-ICA in an IDMA context. Using some evaluation criteria, computer simulation results are presented in Section 5 to ![]() 768 A. HAMZA ET AL. Copyright © 2010 SciRes. IJCNS provide a comparative study. Conclusions are drawing in Section 6. 2. IDMA System Model As shown in Figure 1 (the upper plot is the transmitter and the lower one is the receiver), we consider an IDMA system with K users. A single path channel hk and BPSK modulation are considered here. The nth bit in the se- quence dk of kth user is spread, generating a sequence vector denoted ck=[ck(1), ck(2), ..., ck(J)]T where J is the frame length, C is the spreading factor and the super- script T is the transpose operator. Then ck is permuted by an interleaver πk and at the output of the interleaver, the vector xk=[ xk(1), xk(2), ..., xk(J)]T is obtained. The ele- ments in ck and xk are considered as chips. The chip rate is C times higher than the bit rate. Users are distin- guished mainly by their respective interleavers πk. Each user can have its own signature sequence or all users can share the same spreading code [3]. The received signal can be modeled as: 1() K kk k rjhx jnj j=1…J (1) As illustrated in figure 1, this sub optimal receiver consists of an elementary signal estimator (ESE) and K single user a posteriori probability (APP) decoders (DEC) [1]. The multiple access and coding constraints are con- sidered separately in the ESE and DEC. The outputs of the ESE and DEC are extrinsic log likelihood ratios (LLRs) about {xk(j)} defined in [2]. These LLRs are fur- ther distinguished by subscripts, eESE(xk(j)) and Figure 1. IDMA-N-ICA system model. eDEC(xk(j)), depending on whether they are generated by the ESE or DEC. A global turbo-type iterative process is then applied to process the LLRs generated by the ESE and DEC, as detailed below [1,3]. Pr |1, () log, Pr |1, kk k kk rx jh ex jkj rx jh (2) 2.1. The Basic ESE The Equation (1) can be rewritten as: () kk k rjhx jj (3) () kkk j rjhx j (4) where k is the distortion including interference plus noise in r(j) with respect to user-k [3]. The mean and the variance functions are noted by E(.) and Var(.) respec- tively. k j can be approximated by a random Gaussian va- riable. with mean and variance : () (()) kkk EjErjhExj (5) () k Varj Var (2 ()) ||(()) kk rjhVarxj (6) where 1(()) K kk k Er jEhxjEnj (7) 22 1 K kk k Var rjhVarxj (8) Therefore, the log likelihood ratio [1] is given by: 2.() /(()) ESE kkkk exjhrjE jVarj (9) 2.2. The DEC Function The Dec in our structure performs despreading operation and the extrinsic LLRs eDEC(ck(j)) are used to update E(xk(j)) and V ar(xk(j)) as [3]: ()tanhtanh()/2 kDECk Ex jex j (10) 2 1( ) kk VarEx jEx j (11) This iterative process is repeated a preset number of times. 2.3. The ESE Function for Multi-Path Channels When we consider a multipath fading channel with L paths; the received signal is represented by: 1 , 10 KL kl kl rjhxjlnjj (12) where hk,l are the coefficients related to user k. Following a similar principle as that for single path we obtain Algorithm 1 below for detection in a multipath channel: Algorithm 1: Detection in a Multi-Path Channel 1) Estimation of interference Mean ![]() A. HAMZA ET AL. 769 Copyright © 2010 SciRes. IJCNS 1 , 10 ()( ) KL kl kl ErjhEx jl (13) ,, ( klkl k EjErjlhExj (14) 2) Estimation of interference variance 2 12 , 10 () KL kl kl Var rjhVarxjl (15) 2 ,,klkl k VarjVar rjlhVarxj (16) 3) LLR generation , , , ()2.kl ESEklk l kl rj lEj exjh Var j (17) 1 0() L E SEkESE kl l exj exj (18) 3. ICA and N-ICA Principle The application of ICA consists of estimating the un- known input signals from the output signals without prior knowledge of the channel state information [6]. Let’s suppose that the sources are statistically in- dependent. This is a fundamental assumption for using ICA that is generally verified in communication systems [6]. The extraction of the sources can be done by ICA by exploiting the essential features of the sources and system [7]. In the simplest form of ICA, we observe n scalar variables r1, r2, … rn which are linear combinations of l unknown independent sources or components ICs de- noted by b1, b2, ..., bl. If we express the observed random variables with the vector, r = (r1, r2, ..., rn)T and the ICs variables bj with the vector b = (b1, b2, ..., bl)T then the relationship is given by [8]: mmm rGbn (19) where m r is the mth observed data vector, G is an unknown full rank mixing matrix, m bis an unknown non Gaussian source vector and m n is an additive Gaussian noise process. The goal is to estimate the noise free ICsm busing only the observations m r and the assumption of the inde- pendence of the sources. This means that a set of vectors w1, w2, should be estimated such that W = [w1,w2, ...] is the separating matrix; therefore, the output source esti- mations 1, 2, ., . TT mm rrww... i.e.: T mm yWr (20) are independent and each of them can be used to represent one of the sources. 3.1. Mathematical Representation of IDMA by N-ICA Model In this subsection, we develop the theoretical frame- work and show the similarity between Noisy ICA model and IDMA system model. We focus our atten- tion on synchronous IDMA systems for simplicity and brevity. However, the method can be extended to an asynchronous system by extending the observation interval. After chip rate sampling i.e. C equal spaced samples per symbol are taken, the sampled data is processed within a window of specific size. For synchronous model, data propagated through a single path channel fall into the same window of size Tb for desired and interfering symbols. The samples are then collected into a C×1 vectors rm. , 1 K mkkmkm k rhdsn (20) here k s is the C×1 vector representation of kth user’s interleaved signature sequence andm ndenotes the noise vector. The last equation can be rewritten in a matrix form: bm = [d1,m, d2,m, ..., dK,m] s1 = [s1,1, s2,1, ..., sC,1]T C×1 vector 11,1 1 , 0 ,, 0 m mK KKm K hbn rss hb n 11 ,, mKKmm rshshbn (22) Equation (22) can be represented in a more compact form: mmm rGbn (23) where the C×K matrix G is assumed full rank. We can see the similarity between the IDMA model of Equa- tion (23) and the N-ICA model of Equation (19). The goal of the Noisy-ICA based IDMA detection is to recover the symbol vector bm for each user k without knowing the parametric form of G which depends on the channel coefficients. 4. N-ICA Estimation Algorithm The proposed system is a hybrid structure composed of two parts where a classical IDMA receiver is combined with a N-ICA block as shown in figure 1. Block IDMA, described in the previous section, works for a number of iterations (it) after which the block N-ICA takes over. The proposed N-ICA will act as a post processor attached to an IDMA receiver in the presence of noise. The aim of our N-ICA block is to avoid continuous tracking of channel state information [9]. In this section, we will derive estimation algorithms for the proposed N-ICA post processor in IDMA context. 4.1. Principal Component Analysis Processing The Principal Component Analysis (PCA) based part of the model consists of whitening the input signals. This ![]() 770 A. HAMZA ET AL. Copyright © 2010 SciRes. IJCNS step of processing is achieved by using the PCA in [10] to extract the Principal Components (PCs). This can be done for the noiseless case as follows: 1/2 T YUGB (24) where the matrix U corresponds to the Eigen vector of the data covariance matrix C and the diagonal matrix that contains the related Eigen values : 1/2 = diag [1/2 1/21/2 12 ,,, n ] (25) This PCA processing can be extended to noisy data using bias removal technique [8]. In the regular ICA process, the covariance matrix of the noise free data nf m r can be given by: () nfnfTT mm CErr GG (26) On the other hand, the covariance matrix of the observed noisy data can be written as: TT mm Err GG +2n I CC (27) where 2 is the noise power andn C is the diagonal noise covariance matrix. In the noise bias removal tech- nique, the Eigen values and vectors of matrix n C is used for whitening instead of matrix which is called quasi-whitening [10]. In fact, quasi whitening can be performed on the noisy data as follows: 21/2 () Tm zIUr (28) The covariance matrix of quasi white data is then given by: 221 () T Ezz II (29) From (29), we notice that the covariance matrix is different from the identity matrix. Therefore, we have to take into account the non-whiteness of the data. This is achieved by using the fast ICA algorithm that is presented in the next subsection. 4.2. Fast ICA Algorithm Since only the second order statistics are used to com- pute the matrix, the PCA used in the first part of the model does not provide the best results. Higher order statistics of the received signals contain additional in- formation about the non Gaussian properties of the noise. The purpose of this work is to establish a new scheme in which the system can take into account such random deformations in the detection step. To improve the per- formance, the presence of the noise should be reduced to the minimum using the extracted PCs without additional prior knowledge of their statistical properties. This is the purpose of the ICA based part of the model. Therefore, the ICA model should include a noise term as well in its linear transform matrix. The ICA approach that we present here is our contri- bution to take into account the noise in the ICA model. This means that the bias due to noise should be removed, or at least reduced. Noisy-FastICA has been applied to the blind source separation and interference suppression in multiple access communications before in [11] and FastICA in [9], [10]. The Noisy-FastICA algorithm performs as follows (Algorithm 2): Algorithm 2: Noisy-FastICA Let k be the desired user,m r, m = 1, .., M the received block data and b denotes the estimate of the symbol b. 1) First perform PCA for dimension reduction 2) Quasi- whitened the noisy data using (28) 3) Start ICA Let t=1 and update 13 (( 1)) T mm wtEzwtz 2 3((1) )(1) Tm Ewtz wt where 221 () I I Normalize w(t) : T (t)() wt wt wt w If | (1) T wt wt | < (1 – 10-4), let t= t+1 and go to step 3. 4. Output the estimated desired user’s bit: ,km b = sgn (Zm) 5. Simulation Results In this section, we present the simulation results of the proposed Noisy-Independent Component Analysis (N-ICA) based Interleaved Division Multiple Access (IDMA) presented in this paper. In all simulation results, the following notations have been adopted: It is the iterations number used in IDMA block. Τ represents the percentage of load rate defined by the ratio between the number of users and the spreading factor (K/C). IDMA is the conventional IDMA receiver described in Section 2. IDMA-ICA is the hybrid structure described in [12]. IDMA-N-ICA is the proposed hybrid structure described in Section 3 using the noisy fast ICA algorithm. To evaluate the detection and separation ability of the proposed N-ICA model, performances are presented in terms of raw Bit Error Rate (BER) before decoding for different Signal to Noise Ratios (SNR). We consider a time varying channel, BPSK modulation and Gold spreading codes of length C. Among the parameters that influence the performances are the effect of load rate and the number of iterations for IDMA block. The obtained results are presented in Figures 2-6. In Figures 2 and 3 we show a comparison between our proposed post processor N-ICA and the IDMA re- ceiver for single path and multipath channel respectively. In Figure 4, performances of our proposed receiver are presented for different values of τ (rate of load) and a spreading factor of 63. ![]() A. HAMZA ET AL. 771 Copyright © 2010 SciRes. IJCNS Figure 2. Performance comparison between IDMA-N-ICA and IDMA systems in single path. Figure 3. Performance comparison between IDMA-N-ICA and IDMA systems in single path. Figure 4. IDMA-N-ICA performance comparison for dif- ferent rate load and C = 63. Figure 5. Performance comparison between IDMA-N-ICA and IDMA receiver when c = 31 and τ = 50%. Figure 6. Performance comparison between IDMA-N-ICA and IDMA receiver when c = 31 and τ = 100%. We notice that our proposed scheme handles very well the MAI interferences since convergence is warranted even at very loaded systems (τ100%). Figure 5 shows the added value of our proposed post-processor N-ICA when compared to the conven- tional IDMA receiver for loading rate 50% and for a spreading factor of 31. We notice that both convergence speed and better BER performances are achieved. There- fore, the proposed N-ICA approach can be employed in high loading rate in order to improve the performance of the system in terms of quality of service. Moreover, in case of low loading rate (50%), the proposed post processor allows a reduction in the number of iterations needed by the IDMA block leading to complexity reduction of the overall receiver. In the last simulation scenario, we evaluate the added value of the noisy ICA post processor over the ICA post processor. Figure 6 provides a comparison between ![]() 772 A. HAMZA ET AL. Copyright © 2010 SciRes. IJCNS IDMA, IDMA-ICA and IDMA-N-ICA receivers when the spreading factor is 31 and the load rate is 100%. When SNR is low, N-ICA outperforms the ICA post processor. However, when SNR is high, both receivers present the same performance. These observations are expected since N-ICA takes into account the presence of noise. It is worth noting also that both IDMA-ICA and ID- MA-N-ICA receivers outperforms the conventional IDMA receiver. 6. Conclusions In this paper, N-ICA post processor is proposed in ID- MA context. N-ICA algorithm constitutes an efficient tool for symbol recovery and it offers an efficient alter- native to the IDMA systems with block channel estima- tion. The major contribution of this work is the application of blind detection technique in the IDMA context. The proposed algorithm has better performance compared to the IDMA receiver in loaded systems because it allows dimension reduction (PCA) which helps to reduce the amount of noise in the system. For unloaded systems, the proposed post processor allows a complexity reduction by reducing the number of iterations needed by the IDMA block. In future work, to better analyze the complexity of the proposed scheme, FPGA implementation of IDMA and proposed post pro- cessor will be realized. 7. References [1] P. Li, L. Liu, K. Wu and W. K. Leung, “Interleave Divi- sion Multiple Access,” IEEE Transactions on Wireless Communication, Vol. 5, No. 4, 2006, pp. 938-945. [2] I. Mahafeno, C. Langlais and C. Jego, “Reduced Com- plexity Iterative Multi-User Detector for IDMA (Inter- leave Division Multiple Access) System,” Proceedings of IEEE Global telecommunication Conference, Vol. 1, San Francisco, 2006, pp. 530-540. [3] H. Schoeneich and P. Hoeher, “Semi-Blind Pilot-layer Aided Channel Estimation with Emphasis on Interleave Division Multiple Access Systems,’’ Proceedings of IEEE Global telecommunication Conference, Vol. 3, St. Louis, 2005, pp. 110-118. [4] T. Ristaniemi and J. Joutsensalo, “Advanced ICA Based Receivers for DS-CDMA Systems,” Signal Processing, Vol. 82, 2002, pp. 417-431. [5] M. Gupta and B. Santhanam, “ICA Based Blind Adaptive MAI Suppression in DS-CDMA Systems,” Proceedings of IEEE-DSP Workshop, New Mexico, 2004, pp. 204- 210. [6] J.-F. Cardoso, “Blind Signal Separation: Statistical Prin- ciples,” Proceedings of the IEEE, Vol. 86, No.10, June 1978, pp. 2009-2025. [7] A. Hyvarinen, “Fast and Robust Fixed-Point Algorithms for Independent Component Analysis,” IEEE Transac- tions on Neural Networks, Vol. 10, No. 3, 1999, pp. 626-634. [8] T. Huovinen, A. Shahed and M. Valkama, “Blind Diver- sity Reception and Interference Cancellation Using ICA,” Proceedings of International Conference on Acoustics, Speech and Signal Processing, Vol. 3, 2007, pp. 685-688. [9] A. O. Dahmane, “A New MMSE Based Cascade Fliter MUD Tracking Mode in Time-Varying Channels,” Pro- ceedings of IEEE Conference on Wireless and Mobile Computing, Networking and Communications, Vol.5, 2005, pp. 103-107. [10] M. E. Davies, “Identifiability Issues in Noisy ICA,” Pro- ceedings of IEEE Signal Processing letters, Vol. 11, No. 5, 2004, pp. 470-473. [11] O. Ekici and A. Yongacoglu, “Application of Noisy In- dependent Component Analysis for CDMA Signal Sepa- ration, Proceedings of IEEE-DSP Workshop, Vol. 3, July 2004, pp. 3812-3816. [12] A. Hamza, G. Salut and S. Chitroub, “Independent Com- ponent Analysis in IDMA Systems,” Proceedings of IEEE NEWCAS-TAISA, Toulouse, July 2009, pp. 64-68. [13] R. H. Mahadevappa, “Interference Cancellation Tech- nique for Multi-User Communication System”, PhD the- sis, Northeaster University, Massachusetts, 2002. |