Academia.eduAcademia.edu

Constrained Maximum-Likelihood Detection In CDMA

2001, IEEE Transactions on …

AI-generated Abstract

This paper presents a constrained maximum-likelihood (ML) detection approach in code-division multiple-access (CDMA) systems, addressing the challenges posed by multiple-access interference (MAI). It discusses the limitations of traditional detection methods and introduces a novel complexity-limiting ML detection strategy that aims to improve detection performance while maintaining practical feasibility. The study also explores various iterative and polynomial-time algorithms that can alleviate the impact of MAI, providing a comparative analysis of these techniques.

142 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001 Constrained Maximum-Likelihood Detection in CDMA Peng Hui Tan, Student Member, IEEE, Lars K. Rasmussen, Member, IEEE, and Teng J. Lim, Member, IEEE Abstract—The detection strategy usually denoted optimal multiuser detection is equivalent to the solution of a (0, 1)-constrained maximum-likelihood (ML) problem, a problem which is known to be NP-hard. In contrast, the unconstrained ML problem can be solved quite easily and is known as the decorrelating detector. In this paper, we consider the constrained ML problem where the solution vector is restricted to lie within a closed convex set (CCS). Such a design criterion leads to detector structures which are ML under the constraint assumption. A close relationship between a sphere-constrained ML detector and the well-known minimum mean square error detector is found and verified. An iterative algorithm for solving a CCS constraint problem is derived based on results in linear variational inequality theory. Special cases of this algorithm, subject to a box-constraint, are found to correspond to known, nonlinear successive and parallel interference cancellation structures, using a clipped soft decision for making tentative decisions, while a weighted linear parallel interference canceler with signal-dependent weights arises from the sphere constraint. Convergence issues are investigated and an efficient implementation is suggested. The bit-error rate performance is studied via computer simulations and the expected performance improvements over unconstrained ML are verified. Index Terms—Code-division multiple access, interference cancellation, multiuser detection. I. INTRODUCTION I N ANY multiple-access system, the available resources are shared in some way among all active users. As a consequence, there is a fundamental tradeoff between the amount of resources available for each user and the corresponding interference encountered due to multiple access. In code-division multiple-access (CDMA) systems all resources are in principle available to all users simultaneously. The users are distinguished from each other by user-specific signature Paper approved by G. Caire, the Editor for Multiuser Detection and CDMA of the IEEE Communications Society. Manuscript received September 1, 1999; revised January 6, 2000 and June 9, 2000. This work was supported in part by the Centre for Wireless Communications (Singapore), the National University of Singapore, the Swedish Research Council for Engineering Sciences (TFR), and the Swedish Foundation for Strategic Research (SSF). This paper was presented in part at the International Conference on Information, Communication and Signal Processing, Singapore, December 1999, the 2000 International Zürich Seminar on Broadband Communication, Zürich, Switzerland, February 2000, the IEEE Vehicle Technology Conference, Tokyo, Japan, May 2000, and the IEEE International Symposium on Information Theory, Sorrento, Italy, June 2000. P. H. Tan and L. K. Rasmussen are with the Telecommunication Theory Group, Department of Computer Engineering, Chalmers University of Technology, SE-412 96 Gothenburg, Sweden (email: [email protected]; [email protected]). T. J. Lim is with the Centre for Wireless Communications, Singapore Science Park II, Singapore 117674 (email: [email protected]). Publisher Item Identifier S 0090-6778(01)00257-4. sequences, modulating the transmitted data symbols using direct-sequence spread-spectrum techniques. This in turn leads to a relative high level of multiple-access interference (MAI) as it is not feasible to maintain low (or zero) cross correlation among all users in a practical random-access system. Conventional spread-spectrum detection techniques applied in CDMA are severely limited in performance by MAI, leading to both system capacity limitations as well as strict power control requirements [1]. These limitations are due to the fact that the traditional matched filter output does not represent a sufficient statistic for detection. A detector working on a true sufficient statistic is generally denoted a multiuser detector, and it has the potential of alleviating the MAI problems encountered by conventional techniques. In order to describe the detection strategies to follow, assume an asynchronous transmission of information bits per user using binary phase-shift keying (BPSK) modulation. The number of active users is and the data vector consisting of all transmitted data symbols for all users is denoted by the column . The general maximum-likelihood vector of dimension (ML) detection problem is equivalent to a constrained quadratic optimization. The maximally constrained ML detector finds the where ML solution constrained to denotes the set of all binary -tuples represented as column vectors, i.e., each information symbol estimate must be either or . This detector has previously been denoted the optimal multiuser detector [2]. In the area of optimization, the above ML problem is known as a (0, 1)-constrained (or Boolean-constrained) quadratic minimization which in turn represents a combinatorial quadratic minimization. Such a problem is known to be NP-hard [3] so the (0, 1)-constrained ML detector is therefore in general too complex for practical asynchronous DS-CDMA systems, even with a moderate number of users. For certain special cases of the correlation matrix1 it has been shown that (0, 1)-constrained ML detection can be obtained by successive interference cancellation [4] or by polynomial-time algorithms [5]–[7]. A class of complexity-limiting (0, 1)-constrained ML detectors was suggested in [8], assuming a tree-search based detector structure. An iterative structure which is guaranteed to deliver (0, 1)-constrained ML decisions on some bits was suggested in [9]. The matched filter outputs are here compared to an iteratively tightened threshold through which (0, 1)-constrained ML decisions are made. Decisions on all bits are however not guaranteed. Approximations to the (0, 1)-constrained ML problem have also 1The case of all identical cross correlations, i.e., identical off-diagonal elements of the correlation matrix. 0090–6678/01$10.00 © 2001 IEEE TAN et al.: CONSTRAINED ML DETECTION IN CDMA been suggested in [10] based on the expectation maximization algorithm and in [11] based on iterative transformations of the quadratic minimization problem such that the unconstrained solution to the transformed problem monotonically approaches the desired solution. In this paper, however, we will take a more general approach to complexity-limiting ML detection. To reduce complexity, the constraints imposed on a feasible solution can be relaxed. A simple constraint to impose is to restrict the solution vector to be contained within a closed are convex set (CCS). Examples of CCSs of dimension , an ellipsoid of dimension and a hypercube of . The corresponding optimization problem is dimension known as a CCS constrained quadratic program (CCSQP). The fully unconstrained ML detector was suggested in [12] and is denoted the decorrelating detector. Here, a valid solution vector is found in as each symbol estimate can take on any real value, i.e., no constraints are imposed. The case is denoted an unconstrained quadratic program (UQP). This ML solution Sgn . is then mapped onto a valid data point through This is of course a suboptimal mapping and is not ML [13]. Since the length of the data symbol vector representing the transmitted symbols is constant for constant envelope modulation formats, a simple, sensible constraint to impose on the quadratic optimization is to confine the solution vector to passing through all possible lie within a sphere of radius data points. This is known in the area of optimization as a sphere-constrained quadratic program (SQP) [14]. The SQP problem has been studied intensively in the past and many results exist [15]. The solution for CDMA, following the satisfaction of the Karush–Kuhn–Tucker (KKT) conditions, is a linear detector which is closely related to the MMSE detector. This case has been considered independently in [16]–[18]. Constraining the data estimate vector to lie within a hypercube described by the data points leads to a problem which is known as a box-constrained quadratic program (BQP) [14]. Specifically, we consider the case where each element of the . Again, this data estimate vector must lie in the range problem has been considered independently in [16] and [17], [19]. Such a problem is closely related to the linear complementarity problem (LCP) [20]. The LCP is equivalent to a BQP where each element of the data estimate vector is confined to . Both problems in turn are equivalent to special cases of the linear variational inequality (VI) problem over a rectangle [20]. A general iterative algorithm for solving the LCP was suggested by Ahn in [21]. This algorithm however, is based on the solution of the more general VI problem which includes the constrained quadratic optimization problem under consideration, i.e., the results in [21] can be extended to include the case of convex quadratic optimization subject to a CCS constraint.2 The algorithm can be interpreted as a general interference cancellation structure where some known successive and parallel approaches are recognized as special cases. The tentative decision function which plays an important role in interference cancellation is shown to be equivalent to an orthogonal projection onto the constraining space. It is then shown that the data es2Algorithms for special cases of the VI problem have also been presented in [22]. 143 timate vector resulting from the clip-function interference cancellation schemes in [23] and [24] is asymptotically equivalent to the solution of the BQP, i.e., their performance approach that of the BQP detector as the number of stages tends to infinity. This interpretation also reveals that the projections for both the UQP and the SQP correspond to linear (soft) tentative decision functions, however, the latter case has a gradient which depends on the received signal. Moreover, we derive conditions for convergence for the general iterative algorithm which in turn provides new insight into convergence issues for some known nonlinear cancellation structures. Numerical examples show that only a few stages are needed for practical convergence. At stated previously, at convergence the clip-function interference cancellation scheme provides an ML solution which is constrained to lie within a hypercube defined by the valid data points. The interference cancellation schemes based on a hyperbolic tangent function as a tentative decision suggested in [25]–[28] also provide a solution restricted to lie within the same hypercube. This solution is based on MMSE-optimal decision feedback [29] and is suggested in [27] as an iterative algorithm to find the nonlinear MMSE solution to the detection problem. It is shown that the true solution to this problem is a fixed point but convergence of the suggested algorithm is not proven. Simulation results indicate however that it does converge in most cases. This problem requires a thorough investigation which however, falls beyond the scope of the present paper. The paper is organized as follows. In the following section, the uplink model is described. In Section III we discuss the solution of the constrained ML problem subject to a CCS constraint, introduce an iterative algorithm for solving it and consider convergence behavior. The relationship to known cancellation structures are presented in Section IV, and numerical examples are presented in Section V. Summarizing remarks concludes the paper in Section VI. Throughout this paper scalars are lowercase, vectors are boldfaced lowercase, and matrices are boldfaced uppercase. , and are the transposition and inversion The symbols operators, respectively. All vectors are defined as column vectors with row vectors represented by transposition and denotes the set of real numbers. The notation denotes the set of all -tuples over the set , represented as column vectors. II. SYSTEM MODEL In this section, we describe the baseband uplink model of the CDMA communication system used throughout this paper. The uplink model is based on an asynchronous CDMA system with single-path channels and the presence of additive white Gaussian noise (AWGN) with zero mean and variance . In all our discussions, we assume that users are active simultaneously. , in this multiuser CDMA system User , transmits a binary information symbol stream at data rate symbols per second, where is the symbol interval index and is the length of the data is modulated by a spreading block. To spread the signal, waveform generated from a binary spreading code with a chip 144 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001 rate of chips per second. The spreading code used to modulate the th bit can be written in a vector as with . Binary data and chip formats are assumed for clarity only, and all the later concepts generalize to -ary formats. In addition, when the users are allowed random access to the channel, each user encounters a transmission delay relative to other users. The delay is measured against an arbitrary reference selected such that all the transmission delays are constrained . Assume further that all the delays are conto strained to be integer multiples of the chip interval. The relative delay normalized to the chip interval is then . For a delay of the resulting transmitted discrete-time baseband signal due to symbol interval for user is then The dimension of and is . The continuous-time received signal is down-converted to baseband, passed through a filter matched to the chip pulseshape and sampled. The received baseband signal after chipmatched filtering is then (1) -dimensional vector of independent, identiwhere is an cally distributed Gaussian random variables of zero mean and . Here, we have assumed perfect power variance control and perfect phase synchronization for clarity and notational simplicity. The results do also apply to the general cases of no or arbitrary power control as well as to the case of randomly distributed received signal phases. A more convenient form of (1) is III. CCS-CONSTRAINED ML DETECTION The ML sequence detection criterion is defined as which incidentally is identical to the MAP criterion assuming represents that all data symbols are equally likely. Here, the set of vectors in which the data estimate vector is assumed to exist. Since we are considering an AWGN channel, the negais described as tive log-likelihood function based on the The general constrained ML problem for asynchronous CDMA is then described as (3) The so-called optimal ML detector for CDMA [2] is a where , (0, 1)-constrained minimization of . The i.e., the ML solution is confined to , and complexity in solving this problem is of the order of thus grows exponentially with the number of users (see, e.g., [32] for details). Here we relax the constraint to a CCS in order to limit the . As special complexity of the solution algorithm, i.e., , a sphere cases of , we consider the real vector space determined by , and finally a . hypercube (box) described by is an -vector of all ones and Here, is a compact notation for for all , i.e., each element of is less than or equal to the corresponding . element in . We express this set in a compact way as A CCS is element-wise separable (ES) if where and are appropriate constants. The corresponding constraint for element is denoted by . Clearly and are ES while is not. All the cases can be solved by satisfying the KKT conditions using Lagrange multipliers. The Lagrangian function associated with the SQP problem is (4) where is the matrix of received spreading codes and is the data symbol vector. This model is discussed in more detail in is [30]. A minimal set of sufficient statistics of dimension obtained through correlation matched to the received spreading codes of the users. This is to ensure the maximization of the signal-to-noise ratio [31] and corresponds algebraically to (2) is the correlawhere is the matched filter output vector, tion matrix, and is a zero mean Gaussian noise vector with . In [12], it was shown that is symcovariance matrix metric positive definite (SPD) with probability one in an asynchronous system with arbitrary time delays, i.e., a chip asynchronous system. In the chip synchronous model defined here, there is a nonzero probability that is semi-positive definite. As increases, this probability diminishes. In the rest of the paper, we assume that is SPD. A KKT point for the SQP is then described by a pair for which [15] It is well known that it is possible to completely detail the global solution of (3) under a sphere constraint without requiring any convexity assumption on the objective function. Proposition 1 (Proposition 2.1 [15]): A point such that is a global solution of (3) if and only if there exists a unique such that the pair satisfies the KKT is positive semidefinite. condition in (4), and the matrix If is positive definite, then (3) has a unique global solution. For a proof, see [15]. In our case, we have assumed that is symmetric positive definite, and therefore there exists a TAN et al.: CONSTRAINED ML DETECTION IN CDMA 145 unique solution of the form . This is identical in form to the MMSE solution which is described as [33]. The two linear filters are not identical as the SQP detector confines the solution to be within a sphere while no such constraints are imposed on the MMSE solution. It can , so on average the be shown however that MMSE detector does impose the same restriction [34]. Numerical examples have also revealed that provides, on average, an accurate estimate of the noise variance . Furthermore, numerical examples show that the bit-error rate (BER) performance of the two detectors are virtually identical. With caution, it can therefore be claimed that there is a close relationship between the linear MMSE criterion and the sphere-constrained ML crite. rion. The unconstrained case follows from (4) by setting The result is the well-known decorrelator. No useful interpretation results from the satisfaction of the KKT conditions for the box-constraint. A. Iterative CCSQP Detector is a strictly convex function as long as is SPD, Since over a continuous region can the problem of minimizing be solved by a polynomial-time algorithm [35]. One approach to finding such an algorithm is to consider a VI problem defined as follows, is defined as finding Definition 1: The VI Problem such that a vector (5) where is a given continuous function from is a given CCS. Let us further define to and Having established the existence and uniqueness of a solution to (5), we move on to the critical question of how to find it. Before presenting the iterative algorithm, we need to define the onto a CCS . orthogonal projection operation . Then for each Lemma 1: Let be a CCS in there is a unique point such that for all , and is known as the orthogonal projection of onto the set with respect to the Euclidean norm, i.e., . For an ES CCS, we can further state this corollary to Lemma 1. is ES, then Corollary 1: In case for all . This is denoted as an ES projection (ESP). A result based on the orthogonal projection and which is necessary to prove the final result is as follows. . Then if and Lemma 2: Let be a CCS in , for all or only if , for all . Proofs for Lemma 1 and Lemma 2 can be found in the literature, e.g., [20]. A way to generate an iterative solution to (5) is to convert the given VI problem into a fixed-point formulation [21] using the following lemma. be Lemma 3 (Lemma 3.1 [21]): Let be a CCS, and let , a continuous function. Then is a solution to , if and only if for all for some or all (7) , then Proof: Suppose that is a solution of multiplying the inequality in (5) by and adding to both sides of the resulting inequality, we get (8) We are then ready to establish a close link between CCS-constrained quadratic optimization and a special case of the VI problem. is a convex function and is a soProposition 2: If , then is a solution to the optimization lution to problem in (3). is convex Proof: Since (6) , since is a solution to . But for Therefore, from (6), it can be concluded that all , i.e., is a minimum point of (3). The above proposition is also true when is strictly convex. The proof follows the same arguments. So we can solve (3) by . solving (5) with The existence and uniqueness of a general solution to (5) follows directly from the proof of Proposition 2 and is summarized in the following proposition. Proposition 3: There exists precisely one solution to (5) when if is positive definite. is positive definite, then is a strictly Proof: If convex function. From (3) it follows that for all and therefore for all . . From Lemma 2, it can be concluded that Conversely, if for , then (8) directly and therefore (5) also holds true. For a CCS constraint and , the solution for some . For an then satisfies ES CCS, we can further state the following corollary to Lemma denote element of the vector . 3. Here we let Corollary 2: If is further ES then is a solution to , for all , if and only if for some or all and any positive diagonal matrix . Proof: Since the constraining set is ES, the orthogonal projection is an ESP and then (7) can be restated as for some and . Then according to the one-dimensional case of Lemma 3, we can claim that for each (9) The inequality in (9) can clearly be multiplied with any positive and still be true. Again following Lemma 3, element for all , if and only for some or all , if and . Using the fact that the projection is ESP, we collect all the elements in the vector and the corollary is proven. 146 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001 It therefore follows that for a ES CCS constraint , the solution satisfies (10) and any positive diagonal matrix . for some The following iterative algorithm is proposed in [21] for solving a linear complementarity problem. However, such a problem is a special case of the VI problem considered here [20] and the suggested algorithm is based on the above results for the general VI problem. The algorithm is thus also applicable in solving (10) for given and . , let Algorithm 1: For any initial value (11) , and is the where iteration index. If the orthogonal projection operation can be decoupled into independent element-wise projections, then can be either strictly lower triangular, strictly upper triangular is any positive diagonal or equal to the null matrix and . matrix. Otherwise, is equal to the null matrix and Algorithm 1 has the form of generalized interference cancellation. In fact, as shown later on for each of the three specific CCSs considered, special cases of the algorithm correspond to known successive and parallel cancellation structures. The algorithm is serial (successive) in nature when is strictly upper or lower triangular. Assuming that is lower triangular, the itera, tion of may be conducted element by element. When the algorithm becomes parallel in nature, as iteration only de. This special case of pends on estimates from iteration the algorithm was first suggested in [36]. , and influence the conThe choice of , as well as vergence of the algorithm. Some useful sufficient conditions for convergence of the serial and parallel forms of (11) can however be partitioned be found. Consider first the serial case. Let , where is a diagonal matrix and such that and are strictly lower and upper triangular, respectively. . Also, let Theorem 1: If is either or , the sequence of Algorithm 1 with (12) and are the diagonal elements of and , where respectively, corresponding to user , symbol interval , converges to the solution of the CCSQP for all realizations of and . Proof: The proof is based on showing that for all realizafor where denotes tions of and , the unique fixed point. The complete proof is included in the Appendix. When , the detector becomes a multistage parallel interference canceler, and the conditions for convergence change. to allow for a convergence proof. Again, let , the sequence of Algorithm 1 Theorem 2: If with (13) Fig. 1. An ICU for systematic implementation of IC structures based on (11). converges to the solution of the CCSQP for all realizations of and , where and are the maximum eigenvalue of and the maximum diagonal element of , respectively. Proof: The proof is based on a similar strategy as the proof of Theorem 1 and is included in the Appendix. The choice of other triangular forms for leads to an array of schemes based on block iterations [37], [38]. Previous results show for the linear case that most restricted and slowest converwhile least restricted and fastest congence is found for or . Choices in between vergence is found for bridge the gap between the two extreme. It is difficult, if not impossible, to analytically determine optimal values for the pa, , and . General trends on convergence as these rameters parameters are varied are studied through computer simulations in Section V. IV. RELATIONSHIP TO INTERFERENCE CANCELLATION As mentioned earlier, special cases of Algorithm 1 are equivalent to known successive and parallel interference cancellation structures. An -stage successive interference cancellation (SIC) scheme is described as (14) where . The relationfor ship between the SIC and the general iterative algorithm is clear , and into from substituting , i.e., with relaxed or no power con(11). In cases where corresponds to a normalization of trol, selecting the received amplitudes, adjusting the signal levels to the relevant constraint. The fact that (14) indeed is describing practical interference cancellation for asynchronous CDMA was demonstrated for the linear case in [28] and [38]. Similarly, the -stage weighted parallel interference canceler (PIC) [39] is described as (15) , which can be derived from (11) by for , , and . Again . taking Due to the close relationship to interference cancellation, the general iterative algorithm in (11) can be efficiently impleor . The concept of an interference mented when cancellation unit (ICU) as a general building block can be applied, allowing for systematic construction. The corresponding is shown in Fig. 1. Here, ICU for user at stage denotes the residual received vector for user at stage , TAN et al.: CONSTRAINED ML DETECTION IN CDMA Fig. 2. 147 An SIC structure systematically constructed using ICU blocks. Fig. 3. A PIC structure systematically constructed using ICU blocks. symbol interval and denotes the resulting update of the residual vector. The residual vector is obtained as for for (16) being a partition of where with contains the columns of associated with symbols already while contains the remaining processed at stage is a vector containing the columns of . Similarly, stage estimates up until user , symbol interval , while contains stage estimates of the remaining data symbols. A general successive cancellation structure is then constructed by inter-connecting ICU blocks as shown in Fig. 2. The beauty of this representation is that other cancellation structures can be realized simply by changing the inter-connections of the ICUs. This is demonstrated by the PIC structure shown in Fig. 3. The only difference between the two structures is when and where the residual vector update is carried out. In this representation, the inherent detection delay difference between successive and parallel structures is quite clear. Other combinations of SIC and PIC as suggested in [40] and [41] can also be implemented following this approach. A. Tentative Decision Function The orthogonal projection operation, essential for the algorithm, clearly corresponds to the tentative decision function in a cancellation structure. For unconstrained ML detection , the projection is defined by which obvi- 148 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001 Fig. 5. 2-D example of projection onto a sphere region. Fig. 4. Examples of the tentative decision functions corresponding to the orthogonal projections. The dashed curve represents the linear function for the UQP, the dashed and the dotted curves illustrate the functions for the SQP with 1 and = 1=2, respectively, while the solid curve is the clipped soft decision represented by the BQP projection. = ously can be decoupled into independent element-wise projec. This is of course a linear (soft) decision tions, as illustrated in Fig. 4 by the function with gradient dashed line. When the constraining space is a sphere, the element-wise (nonseparable) projection is described by if if (17) and . This projection operawhere tion is illustrated in Fig. 5 for a two-dimensional (2-D) example. It is clear from the above that is decreasing for increasing . It is also clear that the overall projection does not decouple into independent element-wise projections. The sphere-constrained ML detector can therefore only be impleand with . Also, mented as a PIC structure with since the projection operation depends on an entire data packet, an unacceptable detection delay is encountered. This delay together with other practical problems can be avoided by using an appropriate block approach [38] in order to perform the orthogonal projections. This has been done in the numerical examples. The corresponding tentative decision function is illustrated in (the dashed curve) and for (the dotted Fig. 4 for curve). For the box constraint, the orthogonal projection operation can again be decoupled into independent element-wise orthogonal projections. The th element of the orthogonal projection vector is in this case Fig. 6. 2-D example of projection onto a box region. soft-decision function suggested in [23] and [24] for interference cancellation. This tentative decision function is shown in Fig. 4 as the solid curve. It was shown in [23] that the clip-function SIC has better BER performance than the linear and harddecision SIC, and it is therefore subject to much practical interest [42], [43]. The clip-function weighted PIC also performs better than the linear and hard-decision weighted PIC [24]. The general weighted PIC scheme corresponds to various partial cancellation schemes suggested in the literature for either the soft (linear) or the clipped soft tentative decision function [28], [37], [39], [44]–[46]. Here we have provided conditions for , i.e., the weights stay fixed convergence for the case of for all stages, but not necessarily the same for each user. For corresponding the linear case it is well-known that to the Jacobi iteration provides faster convergence than which is usually denoted as the Richardson iteration [47]. The same is observed through simulations for the nonlinear cases. , it is difficult to advice any analytFor the general case of ical conditions for convergence. For the linear case conditions have been presented in [45] and [46], however no results are currently available for the nonlinear cases [48]. In [28], [39], and [48], some observations based on simulations are presented. B. Convergence Issues if if if (18) This projection is illustrated in the 2-D example shown in Fig. 6. is incidentally identical to the clipped The function An interesting observation regarding convergence is that Theorems 1 and 2 are independent of the constraining CCS. Hence, the conditions for convergence of the cancellation schemes are the same regardless of the tentative decision function. Note however that different schemes do not experience the same convergence rate and the same resulting BER performance. The results TAN et al.: CONSTRAINED ML DETECTION IN CDMA Fig. 7. Average BER of the MMSE and SQP detectors. For were required with ! = 0:6. 149 K = 10, M = 3 iterations were required with ! = 0:7, while for K = 24, M = 7 iterations in Theorems 1 and 2 are known for the linear case [37], however, an important corollary to Theorem 1 is that the clip-funcand tion SIC represented by (14), where , always converges. Indeed, the good convergence behavior of the SIC, whether linear, hard-decision or clip-function, relative to the PIC has been known through simulations for some time. However, the result presented here represents the first proof for the guaranteed convergence of the clip-function SIC. Similar to the SIC case, an important corollary to Theorem 2 is that the clip-function PIC represented by (15), and , always converges when where . Again, this result represents the first sufficient condition for convergence of the clip-function PIC.3 V. NUMERICAL RESULTS In this section we investigate the BER performance and the rate of convergence of the SQP and BQP detectors based on numerical examples. Randomly selected long spreading codes are used and two different scenarios are considered, a lightly loaded and , as well as a more highly loaded case with case where and . The detectors are designed since we assume perfect power control, i.e., . with The and of the PIC is selected based on simulation results such that the fastest possible convergence is achieved. Here we and consider convergence to be reached when the BER for iterations are the same which is not necessarily the same as . The initial data estimate is always chosen having . as 3As made clear above, the concept of using a clipped soft-decision function is quite important. The same function has also been mentioned in [39] and [44] for PIC. TABLE I NUMBER OF ITERATION REQUIRED FOR CONVERGENCE FOR THE SQP-PIC STRUCTURE FOR VARYING ! . DASH DENOTES THAT THE SCHEME IS NOT CONVERGING First, we consider the SQP detector. In Fig. 7 the BER of the PIC is depicted for both cases. The BER of the linear MMSE detector is included for reference. For the lightly loaded case with , , three iterations were required for convergence. As can be seen in the figure, the performance of the SQP and the linear MMSE detector are identical. The same behavior . Here, is observed for the more highly loaded case with and 7 iterations are required for convergence. Again the performance of the SQP and the linear MMSE detector coincide. The influence of the choice of and has been investigated and . The number of iterations refor both quired for convergence is obtained while systematically varying both and . An important observation is that the rate of convergence for the cases investigated depends only on the product and not on the individual values of and . It therefore . The results are summarized seems appropriate to select in Table I. Here we can see that fastest convergence is achieved when while when . for should be chosen as close as possible to the In these cases, upper limit detailed by (13). It is also clear that the convergence ratio. rate of the PIC structure is quite sensitive to the In Figs. 8 and 9 the BERs of the clipped SIC and the clipped PIC are depicted. The BER of the MMSE detector and the single-user bound are used as benchmarks. Fig. 8 shows the 150 Fig. 8. Average BER of the MMSE, clipped SIC and clipped PIC with ! IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001 = 0:9, K = 10; N = 32. Fig. 9. Average BER of the MMSE, clipped SIC and clipped PIC with ! = 0:7, K = 24; BER of the lightly loaded case, where the clipped SIC needs three stages to achieve convergence whereas the clipped PIC ) requires five stages to converge. For a three-stage ( clipped PIC, its BER performance is better than the MMSE detector and thus also better than the SQP-PIC. It can be seen that both interference cancellation schemes perform better than the MMSE detector after convergence but they are still quite far from the single user bound. N = 32. When the system becomes more highly loaded, the convergence rate decreases. This can be seen in Fig. 9, with the clipped SIC now needing six stages to converge and the clipped PIC ) requiring 17 stages. Similarly, a six-stage clipped ( PIC has BER performance which is better than the SQP-PIC and MMSE detectors. Again, the influence of the choice of and has been in, and for both PIC and vestigated for both TAN et al.: CONSTRAINED ML DETECTION IN CDMA TABLE II NUMBER OF ITERATION REQUIRED FOR CONVERGENCE FOR THE BQP-PIC STRUCTURE FOR VARYING ! . DASH DENOTES THAT THE SCHEME IS NOT CONVERGING TABLE III THE NUMBER OF ITERATION REQUIRED FOR CONVERGENCE FOR THE BQP-SIC STRUCTURE FOR VARYING ! . THE DASH DENOTES THAT THE SCHEME IS NOT CONVERGING SIC. Again for the cases investigated, only the product of is of importance. The results are summarized in Tables II and III. Here we can see that for the PIC, fastest convergence is achieved when while when . for The same conclusions as for the SQP apply. In the SIC case, for the best choice of and is and for . In these cases, the limit provided by (12) does not give any indication of the choice for fastest convergence. Another important observation is that the SIC structure is only marginally sensitive to the system load as as comonly one additional iteration is required for . Furthermore, the choice , i.e., no pared to weighting performed, does not lead to significant performance degradation. Comparing the convergence rate characteristics for the PIC structures of both the SQP and the BQP cases, it is observed that some disagreement occur. According to Theorem 2, the convergence conditions should be the same for both cases. The reason for these discrepancies is the approximating window used to accommodate the orthogonal projection for the SQP. This level of approximation influences the convergence behavior. 151 straint was shown to correspond to a clipped soft-decision function for making tentative decisions, a function known to work well in interference cancellation. The numerical examples show that the number of stages required to achieve the solution of the constrained ML problems depends strongly on the ratio for a PIC structure while an SIC structure is only slightly influenced by the load. For both lightly and highly loaded systems, only a few stages of the clipped SIC are sufficient to achieve the solution of the BQP. A (i.e., no additional weighting as compared to choice of conventional SIC) is always close to the best possible choice for the SIC examples considered while for the PIC, the best choice decreases with increasing . of APPENDIX PROOFS OF THEOREMS 1 AND 2 in Proof: [Theorem 1]: Referring to the definition of is a decreasing function of , then (3), if for all realizations of and is the CCSQP solution. We prove given this property of as follows: (19) We have that . It is then easy to show that . Hence, (19) may be rewritten as VI. CONCLUDING REMARKS In this paper, we have introduced the CCS constrained ML detector for CDMA as a complexity-limiting alternative to the (0, 1)-constrained ML detector usually denoted the optimal detector. Three special cases were used as illustrating examples, the unconstrained, the sphere-constrained and the box-constrained cases. A general iterative algorithm was suggested to solve the CCS-constrained ML problem and general conditions for convergence were derived. Known successive and parallel cancellation schemes were recognized as special cases of the algorithm. In fact, the algorithm is a general interference cancellation structure which can efficiently be implemented using an interference cancellation unit as a general building block in a systematic construction. The defining orthogonal projection onto the constraining space was shown to be equivalent to the tentative decision function in a cancellation structure. Specifically, the unconstrained ML detector was shown to lead to a linear tentative decision function while a sphere-constraint also lead to such a function. In this case however, the gradient depends on the length of the projected vector. The box-con- (20) . But it is where clear that each element of is less than or equal to zero, because: , ; 1) if 2) if , the corresponding elements of and have opposite signs because . Therefore, we can conclude that (21) is symmetric and since Hence, the sequence . is nonincreasing. In fact, it is a 152 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001 convergent sequence since is continuous on and is thereby bounded. It follows then that . Now let be an accumulation point, i.e., of the sequence . We show that is in fact a solution of the CCSQP by noting that and therefore or . Hence, we have in the limit as , or , which according to Lemma 3 shows that is the one and only solution of the CCSQP. Proof: [Theorem 2]: In this case, the proof is identical ) to the proof above until expression (21). We con(with , and extinue from there by defining pressing in terms of its eigendecomposition as , we then have where , since . The remainder of the proof follows the proof above, with obvious substitutions. REFERENCES [1] S. Moshavi, “Multi-user detection for DS-CDMA communications,” IEEE Pers. Commun., vol. 34, pp. 132–136, Oct. 1996. [2] S. Verdú, “Minimum probability of error for asynchronous Gaussian multiple-access channels,” IEEE Trans. Inform. Theory, vol. IT-32, pp. 85–96, Jan. 1986. , “Computational complexity of optimum multiuser detection,” Al[3] gorithmica, vol. 4, pp. 303–312, 1989. [4] P. Kempf, “A nonorthogonal synchronous DS-CDMA case where successive cancellation and maximum-likelihood detectors are equivalent,” in Proc. IEEE Int. Symp. Information Theory, Whistler, BC, Canada, Sept. 1995, p. 321. [5] C. Sankaran and T. Ephremides, “Optimal multiuser detection with polynomial complexity,” in Proc. IEEE Int. Symp. Information Theory, Cambridge, MA, Sept. 1998, p. 343. , “Solving a class of optimum multiuser detection problems with [6] polynomial complexity,” IEEE Trans. Inform. Theory, vol. 44, pp. 1958–1961, Sept. 1998. [7] S. Ulukus and R. D. Yates, “Optimum multiuser detection is tractable for synchronous CDMA using -sequences,” IEEE Commun. Lett., vol. 2, pp. 89–91, Apr. 1998. [8] L. K. Rasmussen, T. J. Lim, and T. M. Aulin, “Breadth-first maximumlikelihood detection in multiuser CDMA,” IEEE Trans. Commun., vol. 45, pp. 1176–1178, Oct. 1997. [9] R. Nilsson, F. Sjögren, O. Edfors, P. Ödling, H. Erikson, S. K. Wilson, and P. O. Börjesson, “A low complexity threshold detector making MLSD decisions in a multiuser environment,” in Proc. IEEE Vehicular Technology Conf., Ottawa, ON, Canada, May 1998, pp. 333–337. [10] L. B. Nelson and H. V. Poor, “Iterative multiuser receivers for CDMA channels: An EM-based approach,” IEEE Trans. Commun., vol. 44, pp. 1700–1710, Dec. 1996. m [11] Z.-L. Shi, W. Du, and P. F. Driessen, “A new multistage detector for synchronous CDMA communications,” IEEE Trans. Commun., vol. 44, pp. 538–541, May 1996. [12] R. Lupas and S. Verdú, “Near–far resistance of multiuser detectors in asynchronous channels,” IEEE Trans. Commun., vol. 38, pp. 496–508, Apr. 1990. [13] P. Spasojević, “Sequence and channel estimation for channels with memory,” Ph.D. dissertation, Texas A&M Univ., Dec. 1999. [14] P. M. Pardalos and M. G. C. Resende, “Interior point methods for global optimization,” in Interior Point Method of Mathematical Programming, T. Terlaky, Ed. Norwell, MA: Kluwer, 1996, ch. 12, pp. 467–500. [15] S. Lucidi, L. Palagi, and M. Roma, “On some properties of quadratic programs with a convex quadratic constraint,” SIAM J. Opt., vol. 8, pp. 105–122, Feb. 1998. [16] A. Yener, R. D. Yates, and S. Ulukus, “A nonlinear programming approach to CDMA multiuser detection,” in Proc. Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Oct. 1999, pp. 1579–1583. [17] P. H. Tan, L. K. Rasmussen, and T. J. Lim, “Iterative interference cancellation as maximum-likelihood detection in CDMA,” in Proc. Int. Conf. Information, Communications, and Signal Processing, Singapore, Dec. 1999. , “Sphere-constrained maximum-likelihood detection in CDMA,” [18] in Proc. IEEE Vehicular Technology Conf. Spring-2000, Tokyo, Japan, May 2000. , “Box-constrained maximum-likelihood detection in CDMA,” [19] in Proc. 2000 Int. Zürich Sem. Broadband Communications, Zürich, Switzerland, Feb. 2000, pp. 55–62. [20] A. Nagurney, Network Economics: A Variational Inequality Approach. Norwell, MA: Kluwer, 1993. [21] B. H. Ahn, “Iterative methods for linear complementary problems with upper bounds on primary variables,” Math. Program., vol. 26, no. 3, pp. 295–315, 1983. [22] D. Bertsekas and J. Tsitsiklis, Parallel and Distributed Computation. Englewood Cliffs, NJ: Prentice-Hall, 1989. [23] H. Sugimoto, L. K. Rasmussen, T. J. Lim, and T. Oyama, “Mapping functions for successive interference cancellation in CDMA,” in Proc. IEEE Vehicular Technology Conf., Ottawa, ON, Canada, May 1998, pp. 2301–2305. [24] P. H. Tan and L. K. Rasmussen, “Subtractive interference cancellation for DS-CDMA systems,” in Proc. IEEE Singapore Int. Conf. Communication Systems, Singapore, Nov. 1998, pp. 74–78. [25] R. R. Müller and J. B. Huber, “Iterative soft-decision interference cancellation for CDMA,” in Digital Wireless Communications, J. B. Louise and J. B. Pupolin, Eds. New York: Springer Verlag, 1998, pp. 110–115. [26] S. Gollamudi, S. Nagaraj, Y.-F. Huang, and R. M. Buehrer, “Optimal multistage interference cancellation for CDMA systems using nonlinear MMSE criterion,” in Proc. Asilomar Conf. Signals, Systems, and Computers, vol. 5, Oct. 1998, pp. 665–669. [27] S. Gollamudi and Y.-F. Huang, “Iterative nonlinear MMSE multiuser detection,” in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 5, Phoenix, AZ, Mar. 1999, pp. 2595–2598. [28] R. M. Buehrer, S. P. Nicoloso, and S. Gollamudi, “Linear versus nonlinear interference cancellation,” J. Commun. Networks, vol. 1, pp. 118–133, June 1999. [29] F. Tarköy, “MMSE-optimal feedback and its applications,” in Proc. IEEE Int. Symp. Information Theory, Whistler, BC, Canada, Sept. 1995, p. 334. [30] L. K. Rasmussen, P. D. Alexander, and T. J. Lim, “A linear model for CDMA signals received with multiple antennas over multipath fading channels,” in CDMA Techniques for 3rd Generation Mobile Systems, F. Swarts, P. van Rooyen, I. Oppermann, and M. Lötter, Eds. Norwell, MA: Kluwer, Sept. 1998, ch. 2. [31] J. G. Proakis, Digital Communications, 3 ed. New York: McGrawHill, 1995. [32] L. K. Rasmussen, T. J. Lim, and T. M. Aulin, “Limited complexity maximum-likelihood detection for CDMA,” in Proc. Workshop on Multiple Acess, Mobility and Teletraffic for Personal Communications, Melbourne, Australia, Dec. 1997, pp. 63–76. [33] Z. Xie, R. T. Short, and C. K. Rushforth, “A family of suboptimum detectors for coherent multiuser communications,” IEEE J. Select. Areas Commun., vol. 8, pp. 683–690, May 1990. [34] D. Guo, L. K. Rasmussen, S. Sumei, T. J. Lim, and C. Cheah, “MMSEbased linear parallel interference cancellation in CDMA,” in Proc. IEEE Int. Symp. Spread Spectrum Tech. Appl., Sun City, South Africa, Sept. 1998, pp. 917–921. [35] Y. Nesterov and A. Nemirovskii, Interior-Point Polynomial Algorithms in Convex Programming. Philadelphia, PA: SIAM, 1994. TAN et al.: CONSTRAINED ML DETECTION IN CDMA [36] M. Aganacic, “Variational inequalities and generalized complementarity problems,” Dept. Operations Res., Stanford Univ., Stanford, CA, Tech. Rep. 78-11, Sept. 1978. [37] P. H. Tan and L. K. Rasmussen, “Linear interference cancellation in CDMA based on block iterations,” in Proc. IEEE Vehicular Technology Conf. Spring 2000, Tokyo, Japan, May 2000. , “Linear interference cancellation in CDMA based on iterative [38] techniques for linear equation systems,” IEEE Trans. Commun., vol. 48, pp. 2099–2108, Dec. 2000. [39] D. Divsalar, M. K. Simon, and D. Raphaeli, “Improved parallel interference cancellation for CDMA,” IEEE Trans. Commun., vol. 46, pp. 258–268, Feb. 1998. [40] S. Sumei, L. K. Rasmussen, T. J. Lim, and H. Sugimoto, “A hybrid interference canceller in CDMA,” in Proc. IEEE Int. Symp. Spread Spectrum Techniques and Applications, Sun City, South Africa, Sept. 1998, pp. 150–154. [41] M. Sawahashi, H. Andoh, and K. Higuchi, “Interference rejection weight control for pilot symbol-assisted coherent multistage interference canceller using recursive channel estimation in DS-CDMA mobile radio,” IEICE Trans. Fundamentals, vol. E81-A, pp. 957–970, May 1998. [42] H. Sugimoto, K. L. Cheah, T. J. Lim, L. K. Rasmussen, and S. Sumei, “Performance of hybrid interference canceller with zero-delay channel estimation for CDMA,” in Proc. IEEE Globecom’98, Sydney, Australia, Nov. 1998, pp. 265–270. [43] H. Seki, T. Toda, and Y. Tanaka, “Low delay multistage parallel interference canceller for asynchronous DS/CDMA systems and its performance with closed-loop TPC,” in Proc. Third Asia-Pacific Conf. Communications, Sydney, Australia, Dec. 1997, pp. 832–836. [44] X. Zhang and D. Brady, “Asympototic multiuser efficiencies for decision-directed multiuser detectors,” IEEE Trans. Inform. Theory, vol. 44, pp. 502–515, Mar. 1998. [45] D. Guo, L. K. Rasmussen, and T. J. Lim, “Linear parallel interference cancellation in long-code CDMA multiuser detection,” IEEE J. Select. Areas Commun., vol. 17, pp. 2074–1081, Dec. 1999. [46] D. Guo, L. K. Rasmussen, S. Sun, and T. J. Lim, “A matrix-algebraic approach to linear parallel interference cancellation in CDMA,” IEEE Trans. Commun., vol. 48, pp. 152–161, Jan. 2000. [47] L. A. Hageman and D. M. Young, Applied Iterative Methods. New York: Academic, 1981. [48] R. M. Buehrer, “On the convergence of multistage interference cancellation,” in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific Grove, CA, Oct. 1999, pp. 634–638. 153 Peng Hui Tan (S’00) received the B. Eng. and M. Eng. degrees in electrical and electronic engineering from National University of Singapore in 1998 and 1999, respectively. He is currently working toward the Ph.D. degree within the Telecommunication Theory Group in the Department of Computer Engineering, Chalmers University of Technology,Gothenburg, Sweden. Lars K. Rasmussen (M’93) was born on March 8, 1965, in Copenhagen, Denmark. He received the M.Eng. degree from the Technical University of Denmark, Lyngby, in 1989, and the Ph.D. degree from Georgia Institute of Technology, Atlanta, GA, in 1993. From 1993 to 1995, he was at the University of South Australia, Adelaide, Australia. From 1995 to 1998, he was with the Dentre for Wireless Communications at the National University of Singapore. He is currently an Associate Professor at Chalmers University of Technology, Gothenburg, Sweden. Teng J. Lim (M’95) was born in Singapore on May 4, 1967. He received the B.Eng. degree in electrical engineering from the National University of Singapore in 1992 and the Ph.D. degree from Cambridge University, Cambridge, U.K., in 1995, in the area of IIR filtering for acoustic echo cancellation. Since September 1995, he has been with the Centre for Wireless Communications, Singapore, where he is now a Senior Member of Technical Staff and leads the Signal Processing Strategic Research Group.