142
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001
Constrained Maximum-Likelihood Detection
in CDMA
Peng Hui Tan, Student Member, IEEE, Lars K. Rasmussen, Member, IEEE, and Teng J. Lim, Member, IEEE
Abstract—The detection strategy usually denoted optimal multiuser detection is equivalent to the solution of a (0, 1)-constrained
maximum-likelihood (ML) problem, a problem which is known
to be NP-hard. In contrast, the unconstrained ML problem can
be solved quite easily and is known as the decorrelating detector.
In this paper, we consider the constrained ML problem where the
solution vector is restricted to lie within a closed convex set (CCS).
Such a design criterion leads to detector structures which are ML
under the constraint assumption. A close relationship between a
sphere-constrained ML detector and the well-known minimum
mean square error detector is found and verified. An iterative
algorithm for solving a CCS constraint problem is derived based
on results in linear variational inequality theory. Special cases of
this algorithm, subject to a box-constraint, are found to correspond to known, nonlinear successive and parallel interference
cancellation structures, using a clipped soft decision for making
tentative decisions, while a weighted linear parallel interference
canceler with signal-dependent weights arises from the sphere
constraint. Convergence issues are investigated and an efficient
implementation is suggested. The bit-error rate performance is
studied via computer simulations and the expected performance
improvements over unconstrained ML are verified.
Index Terms—Code-division multiple access, interference cancellation, multiuser detection.
I. INTRODUCTION
I
N ANY multiple-access system, the available resources
are shared in some way among all active users. As a
consequence, there is a fundamental tradeoff between the
amount of resources available for each user and the corresponding interference encountered due to multiple access. In
code-division multiple-access (CDMA) systems all resources
are in principle available to all users simultaneously. The users
are distinguished from each other by user-specific signature
Paper approved by G. Caire, the Editor for Multiuser Detection and CDMA of
the IEEE Communications Society. Manuscript received September 1, 1999; revised January 6, 2000 and June 9, 2000. This work was supported in part by the
Centre for Wireless Communications (Singapore), the National University of
Singapore, the Swedish Research Council for Engineering Sciences (TFR), and
the Swedish Foundation for Strategic Research (SSF). This paper was presented
in part at the International Conference on Information, Communication and
Signal Processing, Singapore, December 1999, the 2000 International Zürich
Seminar on Broadband Communication, Zürich, Switzerland, February 2000,
the IEEE Vehicle Technology Conference, Tokyo, Japan, May 2000, and the
IEEE International Symposium on Information Theory, Sorrento, Italy, June
2000.
P. H. Tan and L. K. Rasmussen are with the Telecommunication Theory
Group, Department of Computer Engineering, Chalmers University of
Technology, SE-412 96 Gothenburg, Sweden (email:
[email protected];
[email protected]).
T. J. Lim is with the Centre for Wireless Communications, Singapore Science
Park II, Singapore 117674 (email:
[email protected]).
Publisher Item Identifier S 0090-6778(01)00257-4.
sequences, modulating the transmitted data symbols using
direct-sequence spread-spectrum techniques. This in turn leads
to a relative high level of multiple-access interference (MAI)
as it is not feasible to maintain low (or zero) cross correlation
among all users in a practical random-access system.
Conventional spread-spectrum detection techniques applied
in CDMA are severely limited in performance by MAI, leading
to both system capacity limitations as well as strict power control requirements [1]. These limitations are due to the fact that
the traditional matched filter output does not represent a sufficient statistic for detection. A detector working on a true sufficient statistic is generally denoted a multiuser detector, and it
has the potential of alleviating the MAI problems encountered
by conventional techniques.
In order to describe the detection strategies to follow, assume
an asynchronous transmission of information bits per user
using binary phase-shift keying (BPSK) modulation. The
number of active users is and the data vector consisting of all
transmitted data symbols for all users is denoted by the column
. The general maximum-likelihood
vector of dimension
(ML) detection problem is equivalent to a constrained quadratic
optimization. The maximally constrained ML detector finds the
where
ML solution constrained to
denotes the set of all binary
-tuples represented as column
vectors, i.e., each information symbol estimate must be either
or
. This detector has previously been denoted the
optimal multiuser detector [2]. In the area of optimization,
the above ML problem is known as a (0, 1)-constrained (or
Boolean-constrained) quadratic minimization which in turn
represents a combinatorial quadratic minimization. Such a
problem is known to be NP-hard [3] so the (0, 1)-constrained
ML detector is therefore in general too complex for practical
asynchronous DS-CDMA systems, even with a moderate
number of users. For certain special cases of the correlation
matrix1 it has been shown that (0, 1)-constrained ML detection
can be obtained by successive interference cancellation [4]
or by polynomial-time algorithms [5]–[7]. A class of complexity-limiting (0, 1)-constrained ML detectors was suggested
in [8], assuming a tree-search based detector structure. An iterative structure which is guaranteed to deliver (0, 1)-constrained
ML decisions on some bits was suggested in [9]. The matched
filter outputs are here compared to an iteratively tightened
threshold through which (0, 1)-constrained ML decisions are
made. Decisions on all bits are however not guaranteed. Approximations to the (0, 1)-constrained ML problem have also
1The case of all identical cross correlations, i.e., identical off-diagonal elements of the correlation matrix.
0090–6678/01$10.00 © 2001 IEEE
TAN et al.: CONSTRAINED ML DETECTION IN CDMA
been suggested in [10] based on the expectation maximization
algorithm and in [11] based on iterative transformations of the
quadratic minimization problem such that the unconstrained
solution to the transformed problem monotonically approaches
the desired solution. In this paper, however, we will take a more
general approach to complexity-limiting ML detection.
To reduce complexity, the constraints imposed on a feasible
solution can be relaxed. A simple constraint to impose is to
restrict the solution vector to be contained within a closed
are
convex set (CCS). Examples of CCSs of dimension
, an ellipsoid of dimension
and a hypercube of
. The corresponding optimization problem is
dimension
known as a CCS constrained quadratic program (CCSQP). The
fully unconstrained ML detector was suggested in [12] and is
denoted the decorrelating detector. Here, a valid solution vector
is found in
as each symbol estimate can take on any
real value, i.e., no constraints are imposed. The case is denoted
an unconstrained quadratic program (UQP). This ML solution
Sgn .
is then mapped onto a valid data point through
This is of course a suboptimal mapping and is not ML [13].
Since the length of the data symbol vector representing
the transmitted symbols is constant for constant envelope
modulation formats, a simple, sensible constraint to impose on
the quadratic optimization is to confine the solution vector to
passing through all possible
lie within a sphere of radius
data points. This is known in the area of optimization as a
sphere-constrained quadratic program (SQP) [14]. The SQP
problem has been studied intensively in the past and many
results exist [15]. The solution for CDMA, following the
satisfaction of the Karush–Kuhn–Tucker (KKT) conditions, is
a linear detector which is closely related to the MMSE detector.
This case has been considered independently in [16]–[18].
Constraining the data estimate vector to lie within a hypercube described by the data points leads to a problem which
is known as a box-constrained quadratic program (BQP) [14].
Specifically, we consider the case where each element of the
. Again, this
data estimate vector must lie in the range
problem has been considered independently in [16] and [17],
[19]. Such a problem is closely related to the linear complementarity problem (LCP) [20]. The LCP is equivalent to a BQP
where each element of the data estimate vector is confined to
. Both problems in turn are equivalent to special cases of
the linear variational inequality (VI) problem over a rectangle
[20]. A general iterative algorithm for solving the LCP was suggested by Ahn in [21]. This algorithm however, is based on the
solution of the more general VI problem which includes the constrained quadratic optimization problem under consideration,
i.e., the results in [21] can be extended to include the case of
convex quadratic optimization subject to a CCS constraint.2
The algorithm can be interpreted as a general interference
cancellation structure where some known successive and parallel approaches are recognized as special cases. The tentative
decision function which plays an important role in interference
cancellation is shown to be equivalent to an orthogonal projection onto the constraining space. It is then shown that the data es2Algorithms for special cases of the VI problem have also been presented in
[22].
143
timate vector resulting from the clip-function interference cancellation schemes in [23] and [24] is asymptotically equivalent
to the solution of the BQP, i.e., their performance approach that
of the BQP detector as the number of stages tends to infinity.
This interpretation also reveals that the projections for both the
UQP and the SQP correspond to linear (soft) tentative decision
functions, however, the latter case has a gradient which depends
on the received signal. Moreover, we derive conditions for convergence for the general iterative algorithm which in turn provides new insight into convergence issues for some known nonlinear cancellation structures. Numerical examples show that
only a few stages are needed for practical convergence.
At stated previously, at convergence the clip-function interference cancellation scheme provides an ML solution which is
constrained to lie within a hypercube defined by the valid data
points. The interference cancellation schemes based on a hyperbolic tangent function as a tentative decision suggested in
[25]–[28] also provide a solution restricted to lie within the same
hypercube. This solution is based on MMSE-optimal decision
feedback [29] and is suggested in [27] as an iterative algorithm
to find the nonlinear MMSE solution to the detection problem. It
is shown that the true solution to this problem is a fixed point but
convergence of the suggested algorithm is not proven. Simulation results indicate however that it does converge in most cases.
This problem requires a thorough investigation which however,
falls beyond the scope of the present paper.
The paper is organized as follows. In the following section,
the uplink model is described. In Section III we discuss the solution of the constrained ML problem subject to a CCS constraint, introduce an iterative algorithm for solving it and consider convergence behavior. The relationship to known cancellation structures are presented in Section IV, and numerical examples are presented in Section V. Summarizing remarks concludes the paper in Section VI.
Throughout this paper scalars are lowercase, vectors are
boldfaced lowercase, and matrices are boldfaced uppercase.
, and
are the transposition and inversion
The symbols
operators, respectively. All vectors are defined as column
vectors with row vectors represented by transposition and
denotes the set of real numbers. The notation
denotes
the set of all -tuples over the set , represented as column
vectors.
II. SYSTEM MODEL
In this section, we describe the baseband uplink model of
the CDMA communication system used throughout this paper.
The uplink model is based on an asynchronous CDMA system
with single-path channels and the presence of additive white
Gaussian noise (AWGN) with zero mean and variance
. In all our discussions, we assume that users are active
simultaneously.
, in this multiuser CDMA system
User ,
transmits a binary information symbol stream
at data rate
symbols per second, where
is the symbol interval index and is the length of the data
is modulated by a spreading
block. To spread the signal,
waveform generated from a binary spreading code with a chip
144
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001
rate of
chips per second. The spreading code used
to modulate the th bit can be written in a vector as
with
. Binary data and chip formats are assumed for clarity only, and all the later concepts generalize to
-ary formats.
In addition, when the users are allowed random access to the
channel, each user encounters a transmission delay relative to
other users. The delay is measured against an arbitrary reference
selected such that all the transmission delays are constrained
. Assume further that all the delays are conto
strained to be integer multiples of the chip interval. The relative delay normalized to the chip interval is then
. For a delay of the resulting transmitted discrete-time baseband signal due to symbol interval for user
is then
The dimension of
and
is
.
The continuous-time received signal is down-converted to
baseband, passed through a filter matched to the chip pulseshape and sampled. The received baseband signal after chipmatched filtering is then
(1)
-dimensional vector of independent, identiwhere is an
cally distributed Gaussian random variables of zero mean and
. Here, we have assumed perfect power
variance
control and perfect phase synchronization for clarity and notational simplicity. The results do also apply to the general cases of
no or arbitrary power control as well as to the case of randomly
distributed received signal phases. A more convenient form of
(1) is
III. CCS-CONSTRAINED ML DETECTION
The ML sequence detection criterion is defined as
which incidentally is identical to the MAP criterion assuming
represents
that all data symbols are equally likely. Here,
the set of vectors in which the data estimate vector is assumed
to exist. Since we are considering an AWGN channel, the negais described as
tive log-likelihood function based on the
The general constrained ML problem for asynchronous CDMA
is then described as
(3)
The so-called optimal ML detector for CDMA [2] is a
where
,
(0, 1)-constrained minimization of
. The
i.e., the ML solution is confined to
, and
complexity in solving this problem is of the order of
thus grows exponentially with the number of users (see, e.g.,
[32] for details).
Here we relax the constraint to a CCS in order to limit the
. As special
complexity of the solution algorithm, i.e.,
, a sphere
cases of , we consider the real vector space
determined by
, and finally a
.
hypercube (box) described by
is an
-vector of all ones and
Here,
is a compact notation for
for all
,
i.e., each element of is less than or equal to the corresponding
.
element in . We express this set in a compact way as
A CCS is element-wise separable (ES) if
where
and
are
appropriate constants. The corresponding constraint for element
is denoted by . Clearly
and are ES while is not.
All the cases can be solved by satisfying the KKT conditions
using Lagrange multipliers. The Lagrangian function associated
with the SQP problem is
(4)
where is the matrix of received spreading codes and is the
data symbol vector. This model is discussed in more detail in
is
[30]. A minimal set of sufficient statistics of dimension
obtained through correlation matched to the received spreading
codes of the users. This is to ensure the maximization of the
signal-to-noise ratio [31] and corresponds algebraically to
(2)
is the correlawhere is the matched filter output vector,
tion matrix, and is a zero mean Gaussian noise vector with
. In [12], it was shown that
is symcovariance matrix
metric positive definite (SPD) with probability one in an asynchronous system with arbitrary time delays, i.e., a chip asynchronous system. In the chip synchronous model defined here,
there is a nonzero probability that is semi-positive definite.
As
increases, this probability diminishes. In the rest of the
paper, we assume that is SPD.
A KKT point for the SQP is then described by a pair
for which
[15]
It is well known that it is possible to completely detail the global
solution of (3) under a sphere constraint without requiring any
convexity assumption on the objective function.
Proposition 1 (Proposition 2.1 [15]): A point such that
is a global solution of (3) if and only if there
exists a unique
such that the pair
satisfies the KKT
is positive semidefinite.
condition in (4), and the matrix
If
is positive definite, then (3) has a unique global
solution.
For a proof, see [15]. In our case, we have assumed that
is symmetric positive definite, and therefore there exists a
TAN et al.: CONSTRAINED ML DETECTION IN CDMA
145
unique solution of the form
. This is identical in form to the MMSE solution which is described as
[33]. The two linear filters are not identical as the
SQP detector confines the solution to be within a sphere while
no such constraints are imposed on the MMSE solution. It can
, so on average the
be shown however that
MMSE detector does impose the same restriction [34]. Numerical examples have also revealed that provides, on average, an
accurate estimate of the noise variance . Furthermore, numerical examples show that the bit-error rate (BER) performance
of the two detectors are virtually identical. With caution, it can
therefore be claimed that there is a close relationship between
the linear MMSE criterion and the sphere-constrained ML crite.
rion. The unconstrained case follows from (4) by setting
The result is the well-known decorrelator. No useful interpretation results from the satisfaction of the KKT conditions for the
box-constraint.
A. Iterative CCSQP Detector
is a strictly convex function as long as is SPD,
Since
over a continuous region can
the problem of minimizing
be solved by a polynomial-time algorithm [35]. One approach
to finding such an algorithm is to consider a VI problem defined
as follows,
is defined as finding
Definition 1: The VI Problem
such that
a vector
(5)
where is a given continuous function from
is a given CCS.
Let us further define
to
and
Having established the existence and uniqueness of a solution
to (5), we move on to the critical question of how to find it.
Before presenting the iterative algorithm, we need to define the
onto a CCS .
orthogonal projection operation
. Then for each
Lemma 1: Let be a CCS in
there is a unique point
such that
for all
, and is known as the orthogonal projection
of onto the set with respect to the Euclidean norm, i.e.,
. For an ES CCS, we can
further state this corollary to Lemma 1.
is ES, then
Corollary 1: In case
for all
. This is
denoted as an ES projection (ESP). A result based on the
orthogonal projection and which is necessary to prove the final
result is as follows.
. Then
if and
Lemma 2: Let be a CCS in
, for all
or
only if
, for all
.
Proofs for Lemma 1 and Lemma 2 can be found in the literature, e.g., [20].
A way to generate an iterative solution to (5) is to convert the
given VI problem into a fixed-point formulation [21] using the
following lemma.
be
Lemma 3 (Lemma 3.1 [21]): Let be a CCS, and let
,
a continuous function. Then is a solution to
, if and only if
for all
for some or all
(7)
, then
Proof: Suppose that is a solution of
multiplying the inequality in (5) by
and adding
to both sides of the resulting inequality, we get
(8)
We are then ready to establish a close link between CCS-constrained quadratic optimization and a special case of the VI
problem.
is a convex function and is a soProposition 2: If
, then is a solution to the optimization
lution to
problem in (3).
is convex
Proof: Since
(6)
, since is a solution to
.
But
for
Therefore, from (6), it can be concluded that
all
, i.e., is a minimum point of (3).
The above proposition is also true when is strictly convex.
The proof follows the same arguments. So we can solve (3) by
.
solving (5) with
The existence and uniqueness of a general solution to (5) follows directly from the proof of Proposition 2 and is summarized
in the following proposition.
Proposition 3: There exists precisely one solution to (5)
when
if is positive definite.
is positive definite, then
is a strictly
Proof: If
convex function. From (3) it follows that
for all
and therefore
for
all
.
.
From Lemma 2, it can be concluded that
Conversely, if
for
, then (8) directly
and therefore (5) also holds true.
For a CCS constraint and
, the solution
for some
. For an
then satisfies
ES CCS, we can further state the following corollary to Lemma
denote element of the vector
.
3. Here we let
Corollary 2: If is further ES then is a solution to
, for all
, if and only if
for some or all
and any positive diagonal matrix .
Proof: Since the constraining set is ES, the orthogonal projection is an ESP and then (7) can be restated as
for some
and
.
Then according to the one-dimensional case of Lemma 3, we
can claim that for each
(9)
The inequality in (9) can clearly be multiplied with any positive
and still be true. Again following Lemma 3,
element
for all
,
if and only
for some or all
,
if
and
. Using the fact that the projection is ESP,
we collect all the elements in the vector and the corollary is
proven.
146
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001
It therefore follows that for a ES CCS constraint , the solution satisfies
(10)
and any positive diagonal matrix .
for some
The following iterative algorithm is proposed in [21] for
solving a linear complementarity problem. However, such
a problem is a special case of the VI problem considered
here [20] and the suggested algorithm is based on the above
results for the general VI problem. The algorithm is thus also
applicable in solving (10) for given and .
, let
Algorithm 1: For any initial value
(11)
,
and
is the
where
iteration index. If the orthogonal projection operation can be
decoupled into independent element-wise projections, then
can be either strictly lower triangular, strictly upper triangular
is any positive diagonal
or equal to the null matrix and
.
matrix. Otherwise, is equal to the null matrix and
Algorithm 1 has the form of generalized interference cancellation. In fact, as shown later on for each of the three specific
CCSs considered, special cases of the algorithm correspond to
known successive and parallel cancellation structures. The algorithm is serial (successive) in nature when is strictly upper or
lower triangular. Assuming that is lower triangular, the itera,
tion of may be conducted element by element. When
the algorithm becomes parallel in nature, as iteration only de. This special case of
pends on estimates from iteration
the algorithm was first suggested in [36].
, and influence the conThe choice of , as well as
vergence of the algorithm. Some useful sufficient conditions for
convergence of the serial and parallel forms of (11) can however
be partitioned
be found. Consider first the serial case. Let
, where is a diagonal matrix and
such that
and
are strictly lower and upper triangular, respectively.
.
Also, let
Theorem 1: If
is either or , the sequence
of
Algorithm 1 with
(12)
and
are the diagonal elements of and ,
where
respectively, corresponding to user , symbol interval , converges to the solution of the CCSQP for all realizations of
and .
Proof: The proof is based on showing that for all realizafor
where denotes
tions of and ,
the unique fixed point. The complete proof is included in the
Appendix.
When
, the detector becomes a multistage parallel interference canceler, and the conditions for convergence change.
to allow for a convergence proof.
Again, let
, the sequence
of Algorithm 1
Theorem 2: If
with
(13)
Fig. 1.
An ICU for systematic implementation of IC structures based on (11).
converges to the solution of the CCSQP for all realizations of
and , where
and
are the maximum eigenvalue of
and the maximum diagonal element of , respectively.
Proof: The proof is based on a similar strategy as the proof
of Theorem 1 and is included in the Appendix.
The choice of other triangular forms for leads to an array
of schemes based on block iterations [37], [38]. Previous results
show for the linear case that most restricted and slowest converwhile least restricted and fastest congence is found for
or
. Choices in between
vergence is found for
bridge the gap between the two extreme. It is difficult, if not
impossible, to analytically determine optimal values for the pa, , and . General trends on convergence as these
rameters
parameters are varied are studied through computer simulations
in Section V.
IV. RELATIONSHIP TO INTERFERENCE CANCELLATION
As mentioned earlier, special cases of Algorithm 1 are equivalent to known successive and parallel interference cancellation structures. An -stage successive interference cancellation
(SIC) scheme is described as
(14)
where
. The relationfor
ship between the SIC and the general iterative algorithm is clear
,
and
into
from substituting
, i.e., with relaxed or no power con(11). In cases where
corresponds to a normalization of
trol, selecting
the received amplitudes, adjusting the signal levels to the relevant constraint. The fact that (14) indeed is describing practical
interference cancellation for asynchronous CDMA was demonstrated for the linear case in [28] and [38].
Similarly, the -stage weighted parallel interference canceler (PIC) [39] is described as
(15)
, which can be derived from (11) by
for
,
,
and
. Again
.
taking
Due to the close relationship to interference cancellation,
the general iterative algorithm in (11) can be efficiently impleor
. The concept of an interference
mented when
cancellation unit (ICU) as a general building block can be applied, allowing for systematic construction. The corresponding
is shown in Fig. 1. Here,
ICU for user at stage
denotes the residual received vector for user at stage ,
TAN et al.: CONSTRAINED ML DETECTION IN CDMA
Fig. 2.
147
An SIC structure systematically constructed using ICU blocks.
Fig. 3. A PIC structure systematically constructed using ICU blocks.
symbol interval and
denotes the resulting update
of the residual vector. The residual vector is obtained as
for
for
(16)
being a partition of where
with
contains the columns of
associated with symbols already
while
contains the remaining
processed at stage
is a vector containing the
columns of . Similarly,
stage
estimates up until user , symbol interval , while
contains stage
estimates of the remaining data
symbols. A general successive cancellation structure is then
constructed by inter-connecting ICU blocks as shown in Fig. 2.
The beauty of this representation is that other cancellation
structures can be realized simply by changing the inter-connections of the ICUs. This is demonstrated by the PIC structure
shown in Fig. 3.
The only difference between the two structures is when and
where the residual vector update is carried out. In this representation, the inherent detection delay difference between successive and parallel structures is quite clear. Other combinations of
SIC and PIC as suggested in [40] and [41] can also be implemented following this approach.
A. Tentative Decision Function
The orthogonal projection operation, essential for the algorithm, clearly corresponds to the tentative decision function in
a cancellation structure. For unconstrained ML detection
, the projection is defined by
which obvi-
148
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001
Fig. 5. 2-D example of projection onto a sphere region.
Fig. 4. Examples of the tentative decision functions corresponding to the
orthogonal projections. The dashed curve represents the linear function for the
UQP, the dashed and the dotted curves illustrate the functions for the SQP with
1 and = 1=2, respectively, while the solid curve is the clipped soft
decision represented by the BQP projection.
=
ously can be decoupled into independent element-wise projec. This is of course a linear (soft) decision
tions,
as illustrated in Fig. 4 by the
function with gradient
dashed line. When the constraining space is a sphere, the element-wise (nonseparable) projection is described by
if
if
(17)
and
. This projection operawhere
tion is illustrated in Fig. 5 for a two-dimensional (2-D) example.
It is clear from the above that is decreasing for increasing
. It is also clear that the overall projection does
not decouple into independent element-wise projections. The
sphere-constrained ML detector can therefore only be impleand with
. Also,
mented as a PIC structure with
since the projection operation depends on an entire data packet,
an unacceptable detection delay is encountered. This delay together with other practical problems can be avoided by using an
appropriate block approach [38] in order to perform the orthogonal projections. This has been done in the numerical examples.
The corresponding tentative decision function is illustrated in
(the dashed curve) and for
(the dotted
Fig. 4 for
curve).
For the box constraint, the orthogonal projection operation
can again be decoupled into independent element-wise orthogonal projections. The th element of the orthogonal projection
vector is in this case
Fig. 6. 2-D example of projection onto a box region.
soft-decision function suggested in [23] and [24] for interference cancellation. This tentative decision function is shown in
Fig. 4 as the solid curve. It was shown in [23] that the clip-function SIC has better BER performance than the linear and harddecision SIC, and it is therefore subject to much practical interest [42], [43]. The clip-function weighted PIC also performs
better than the linear and hard-decision weighted PIC [24].
The general weighted PIC scheme corresponds to various partial cancellation schemes suggested in the literature for either
the soft (linear) or the clipped soft tentative decision function
[28], [37], [39], [44]–[46]. Here we have provided conditions for
, i.e., the weights stay fixed
convergence for the case of
for all stages, but not necessarily the same for each user. For
corresponding
the linear case it is well-known that
to the Jacobi iteration provides faster convergence than
which is usually denoted as the Richardson iteration [47]. The
same is observed through simulations for the nonlinear cases.
, it is difficult to advice any analytFor the general case of
ical conditions for convergence. For the linear case conditions
have been presented in [45] and [46], however no results are currently available for the nonlinear cases [48]. In [28], [39], and
[48], some observations based on simulations are presented.
B. Convergence Issues
if
if
if
(18)
This projection is illustrated in the 2-D example shown in Fig. 6.
is incidentally identical to the clipped
The function
An interesting observation regarding convergence is that Theorems 1 and 2 are independent of the constraining CCS. Hence,
the conditions for convergence of the cancellation schemes are
the same regardless of the tentative decision function. Note however that different schemes do not experience the same convergence rate and the same resulting BER performance. The results
TAN et al.: CONSTRAINED ML DETECTION IN CDMA
Fig. 7. Average BER of the MMSE and SQP detectors. For
were required with ! = 0:6.
149
K = 10, M = 3 iterations were required with ! = 0:7, while for K = 24, M = 7 iterations
in Theorems 1 and 2 are known for the linear case [37], however, an important corollary to Theorem 1 is that the clip-funcand
tion SIC represented by (14), where
, always converges. Indeed, the good convergence
behavior of the SIC, whether linear, hard-decision or clip-function, relative to the PIC has been known through simulations
for some time. However, the result presented here represents
the first proof for the guaranteed convergence of the clip-function SIC. Similar to the SIC case, an important corollary to
Theorem 2 is that the clip-function PIC represented by (15),
and
, always converges when
where
. Again, this result represents the first sufficient condition for convergence of the clip-function PIC.3
V. NUMERICAL RESULTS
In this section we investigate the BER performance and the
rate of convergence of the SQP and BQP detectors based on numerical examples. Randomly selected long spreading codes are
used and two different scenarios are considered, a lightly loaded
and
, as well as a more highly loaded
case with
case where
and
. The detectors are designed
since we assume perfect power control, i.e.,
.
with
The and of the PIC is selected based on simulation results
such that the fastest possible convergence is achieved. Here we
and
consider convergence to be reached when the BER for
iterations are the same which is not necessarily the same as
. The initial data estimate
is always chosen
having
.
as
3As made clear above, the concept of using a clipped soft-decision function
is quite important. The same function has also been mentioned in [39] and [44]
for PIC.
TABLE I
NUMBER OF ITERATION REQUIRED FOR CONVERGENCE FOR THE
SQP-PIC STRUCTURE FOR VARYING ! . DASH DENOTES THAT THE
SCHEME IS NOT CONVERGING
First, we consider the SQP detector. In Fig. 7 the BER of the
PIC is depicted for both cases. The BER of the linear MMSE detector is included for reference. For the lightly loaded case with
,
, three iterations were required for convergence. As can be seen in the figure, the performance of the SQP
and the linear MMSE detector are identical. The same behavior
. Here,
is observed for the more highly loaded case with
and 7 iterations are required for convergence. Again
the performance of the SQP and the linear MMSE detector coincide.
The influence of the choice of and has been investigated
and
. The number of iterations refor both
quired for convergence is obtained while systematically varying
both and . An important observation is that the rate of convergence for the cases investigated depends only on the product
and not on the individual values of and . It therefore
. The results are summarized
seems appropriate to select
in Table I. Here we can see that fastest convergence is achieved
when
while
when
.
for
should be chosen as close as possible to the
In these cases,
upper limit detailed by (13). It is also clear that the convergence
ratio.
rate of the PIC structure is quite sensitive to the
In Figs. 8 and 9 the BERs of the clipped SIC and the clipped
PIC are depicted. The BER of the MMSE detector and the
single-user bound are used as benchmarks. Fig. 8 shows the
150
Fig. 8. Average BER of the MMSE, clipped SIC and clipped PIC with !
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001
= 0:9, K = 10; N = 32.
Fig. 9. Average BER of the MMSE, clipped SIC and clipped PIC with ! = 0:7, K = 24;
BER of the lightly loaded case, where the clipped SIC needs
three stages to achieve convergence whereas the clipped PIC
) requires five stages to converge. For a three-stage
(
clipped PIC, its BER performance is better than the MMSE
detector and thus also better than the SQP-PIC. It can be seen
that both interference cancellation schemes perform better than
the MMSE detector after convergence but they are still quite
far from the single user bound.
N = 32.
When the system becomes more highly loaded, the convergence rate decreases. This can be seen in Fig. 9, with the clipped
SIC now needing six stages to converge and the clipped PIC
) requiring 17 stages. Similarly, a six-stage clipped
(
PIC has BER performance which is better than the SQP-PIC and
MMSE detectors.
Again, the influence of the choice of and has been in,
and for both PIC and
vestigated for both
TAN et al.: CONSTRAINED ML DETECTION IN CDMA
TABLE II
NUMBER OF ITERATION REQUIRED FOR CONVERGENCE FOR THE
BQP-PIC STRUCTURE FOR VARYING ! . DASH DENOTES THAT THE
SCHEME IS NOT CONVERGING
TABLE III
THE NUMBER OF ITERATION REQUIRED FOR CONVERGENCE FOR THE
BQP-SIC STRUCTURE FOR VARYING ! . THE DASH DENOTES THAT THE
SCHEME IS NOT CONVERGING
SIC. Again for the cases investigated, only the product of
is
of importance. The results are summarized in Tables II and III.
Here we can see that for the PIC, fastest convergence is achieved
when
while
when
.
for
The same conclusions as for the SQP apply. In the SIC case,
for
the best choice of and is
and
for
. In these cases, the limit
provided by (12) does not give any indication of the choice for
fastest convergence. Another important observation is that the
SIC structure is only marginally sensitive to the system load as
as comonly one additional iteration is required for
. Furthermore, the choice
, i.e., no
pared to
weighting performed, does not lead to significant performance
degradation.
Comparing the convergence rate characteristics for the PIC
structures of both the SQP and the BQP cases, it is observed that
some disagreement occur. According to Theorem 2, the convergence conditions should be the same for both cases. The reason
for these discrepancies is the approximating window used to accommodate the orthogonal projection for the SQP. This level of
approximation influences the convergence behavior.
151
straint was shown to correspond to a clipped soft-decision
function for making tentative decisions, a function known to
work well in interference cancellation.
The numerical examples show that the number of stages required to achieve the solution of the constrained ML problems
depends strongly on the
ratio for a PIC structure while
an SIC structure is only slightly influenced by the load. For
both lightly and highly loaded systems, only a few stages of the
clipped SIC are sufficient to achieve the solution of the BQP. A
(i.e., no additional weighting as compared to
choice of
conventional SIC) is always close to the best possible choice for
the SIC examples considered while for the PIC, the best choice
decreases with increasing
.
of
APPENDIX
PROOFS OF THEOREMS 1 AND 2
in
Proof: [Theorem 1]: Referring to the definition of
is a decreasing function of , then
(3), if
for all realizations of and is the CCSQP solution. We prove
given
this property of
as follows:
(19)
We have that
. It is then easy to show that
.
Hence, (19) may be rewritten as
VI. CONCLUDING REMARKS
In this paper, we have introduced the CCS constrained ML
detector for CDMA as a complexity-limiting alternative to the
(0, 1)-constrained ML detector usually denoted the optimal
detector. Three special cases were used as illustrating examples,
the unconstrained, the sphere-constrained and the box-constrained cases. A general iterative algorithm was suggested to
solve the CCS-constrained ML problem and general conditions
for convergence were derived. Known successive and parallel
cancellation schemes were recognized as special cases of the
algorithm. In fact, the algorithm is a general interference cancellation structure which can efficiently be implemented using
an interference cancellation unit as a general building block in
a systematic construction. The defining orthogonal projection
onto the constraining space was shown to be equivalent to
the tentative decision function in a cancellation structure.
Specifically, the unconstrained ML detector was shown to lead
to a linear tentative decision function while a sphere-constraint
also lead to such a function. In this case however, the gradient
depends on the length of the projected vector. The box-con-
(20)
. But it is
where
clear that each element of
is less than or equal to zero, because:
,
;
1) if
2) if
, the corresponding elements of
and
have opposite signs because
.
Therefore, we can conclude that
(21)
is symmetric and
since
Hence, the sequence
.
is nonincreasing. In fact, it is a
152
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 1, JANUARY 2001
convergent sequence since is continuous on and is thereby
bounded. It follows then that
. Now let be an accumulation point, i.e.,
of the sequence
. We show that is in fact a solution of
the CCSQP by noting that
and therefore
or
. Hence, we have in the limit as
,
or
, which according to Lemma 3 shows that
is the one and only solution of the CCSQP.
Proof: [Theorem 2]: In this case, the proof is identical
) to the proof above until expression (21). We con(with
, and extinue from there by defining
pressing in terms of its eigendecomposition as
, we
then have
where
, since
.
The remainder of the proof follows the proof above, with obvious substitutions.
REFERENCES
[1] S. Moshavi, “Multi-user detection for DS-CDMA communications,”
IEEE Pers. Commun., vol. 34, pp. 132–136, Oct. 1996.
[2] S. Verdú, “Minimum probability of error for asynchronous Gaussian
multiple-access channels,” IEEE Trans. Inform. Theory, vol. IT-32, pp.
85–96, Jan. 1986.
, “Computational complexity of optimum multiuser detection,” Al[3]
gorithmica, vol. 4, pp. 303–312, 1989.
[4] P. Kempf, “A nonorthogonal synchronous DS-CDMA case where successive cancellation and maximum-likelihood detectors are equivalent,”
in Proc. IEEE Int. Symp. Information Theory, Whistler, BC, Canada,
Sept. 1995, p. 321.
[5] C. Sankaran and T. Ephremides, “Optimal multiuser detection with polynomial complexity,” in Proc. IEEE Int. Symp. Information Theory, Cambridge, MA, Sept. 1998, p. 343.
, “Solving a class of optimum multiuser detection problems with
[6]
polynomial complexity,” IEEE Trans. Inform. Theory, vol. 44, pp.
1958–1961, Sept. 1998.
[7] S. Ulukus and R. D. Yates, “Optimum multiuser detection is tractable for
synchronous CDMA using -sequences,” IEEE Commun. Lett., vol. 2,
pp. 89–91, Apr. 1998.
[8] L. K. Rasmussen, T. J. Lim, and T. M. Aulin, “Breadth-first maximumlikelihood detection in multiuser CDMA,” IEEE Trans. Commun., vol.
45, pp. 1176–1178, Oct. 1997.
[9] R. Nilsson, F. Sjögren, O. Edfors, P. Ödling, H. Erikson, S. K. Wilson,
and P. O. Börjesson, “A low complexity threshold detector making
MLSD decisions in a multiuser environment,” in Proc. IEEE Vehicular
Technology Conf., Ottawa, ON, Canada, May 1998, pp. 333–337.
[10] L. B. Nelson and H. V. Poor, “Iterative multiuser receivers for CDMA
channels: An EM-based approach,” IEEE Trans. Commun., vol. 44, pp.
1700–1710, Dec. 1996.
m
[11] Z.-L. Shi, W. Du, and P. F. Driessen, “A new multistage detector for
synchronous CDMA communications,” IEEE Trans. Commun., vol. 44,
pp. 538–541, May 1996.
[12] R. Lupas and S. Verdú, “Near–far resistance of multiuser detectors in
asynchronous channels,” IEEE Trans. Commun., vol. 38, pp. 496–508,
Apr. 1990.
[13] P. Spasojević, “Sequence and channel estimation for channels with
memory,” Ph.D. dissertation, Texas A&M Univ., Dec. 1999.
[14] P. M. Pardalos and M. G. C. Resende, “Interior point methods for global
optimization,” in Interior Point Method of Mathematical Programming,
T. Terlaky, Ed. Norwell, MA: Kluwer, 1996, ch. 12, pp. 467–500.
[15] S. Lucidi, L. Palagi, and M. Roma, “On some properties of quadratic
programs with a convex quadratic constraint,” SIAM J. Opt., vol. 8, pp.
105–122, Feb. 1998.
[16] A. Yener, R. D. Yates, and S. Ulukus, “A nonlinear programming approach to CDMA multiuser detection,” in Proc. Asilomar Conf. Signals,
Systems, and Computers, Pacific Grove, CA, Oct. 1999, pp. 1579–1583.
[17] P. H. Tan, L. K. Rasmussen, and T. J. Lim, “Iterative interference cancellation as maximum-likelihood detection in CDMA,” in Proc. Int. Conf.
Information, Communications, and Signal Processing, Singapore, Dec.
1999.
, “Sphere-constrained maximum-likelihood detection in CDMA,”
[18]
in Proc. IEEE Vehicular Technology Conf. Spring-2000, Tokyo, Japan,
May 2000.
, “Box-constrained maximum-likelihood detection in CDMA,”
[19]
in Proc. 2000 Int. Zürich Sem. Broadband Communications, Zürich,
Switzerland, Feb. 2000, pp. 55–62.
[20] A. Nagurney, Network Economics: A Variational Inequality Approach. Norwell, MA: Kluwer, 1993.
[21] B. H. Ahn, “Iterative methods for linear complementary problems with
upper bounds on primary variables,” Math. Program., vol. 26, no. 3, pp.
295–315, 1983.
[22] D. Bertsekas and J. Tsitsiklis, Parallel and Distributed Computation. Englewood Cliffs, NJ: Prentice-Hall, 1989.
[23] H. Sugimoto, L. K. Rasmussen, T. J. Lim, and T. Oyama, “Mapping
functions for successive interference cancellation in CDMA,” in Proc.
IEEE Vehicular Technology Conf., Ottawa, ON, Canada, May 1998, pp.
2301–2305.
[24] P. H. Tan and L. K. Rasmussen, “Subtractive interference cancellation
for DS-CDMA systems,” in Proc. IEEE Singapore Int. Conf. Communication Systems, Singapore, Nov. 1998, pp. 74–78.
[25] R. R. Müller and J. B. Huber, “Iterative soft-decision interference cancellation for CDMA,” in Digital Wireless Communications, J. B. Louise
and J. B. Pupolin, Eds. New York: Springer Verlag, 1998, pp. 110–115.
[26] S. Gollamudi, S. Nagaraj, Y.-F. Huang, and R. M. Buehrer, “Optimal
multistage interference cancellation for CDMA systems using nonlinear
MMSE criterion,” in Proc. Asilomar Conf. Signals, Systems, and Computers, vol. 5, Oct. 1998, pp. 665–669.
[27] S. Gollamudi and Y.-F. Huang, “Iterative nonlinear MMSE multiuser
detection,” in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 5, Phoenix, AZ, Mar. 1999, pp. 2595–2598.
[28] R. M. Buehrer, S. P. Nicoloso, and S. Gollamudi, “Linear versus
nonlinear interference cancellation,” J. Commun. Networks, vol. 1, pp.
118–133, June 1999.
[29] F. Tarköy, “MMSE-optimal feedback and its applications,” in Proc.
IEEE Int. Symp. Information Theory, Whistler, BC, Canada, Sept. 1995,
p. 334.
[30] L. K. Rasmussen, P. D. Alexander, and T. J. Lim, “A linear model for
CDMA signals received with multiple antennas over multipath fading
channels,” in CDMA Techniques for 3rd Generation Mobile Systems, F.
Swarts, P. van Rooyen, I. Oppermann, and M. Lötter, Eds. Norwell,
MA: Kluwer, Sept. 1998, ch. 2.
[31] J. G. Proakis, Digital Communications, 3 ed. New York: McGrawHill, 1995.
[32] L. K. Rasmussen, T. J. Lim, and T. M. Aulin, “Limited complexity
maximum-likelihood detection for CDMA,” in Proc. Workshop on Multiple Acess, Mobility and Teletraffic for Personal Communications, Melbourne, Australia, Dec. 1997, pp. 63–76.
[33] Z. Xie, R. T. Short, and C. K. Rushforth, “A family of suboptimum detectors for coherent multiuser communications,” IEEE J. Select. Areas
Commun., vol. 8, pp. 683–690, May 1990.
[34] D. Guo, L. K. Rasmussen, S. Sumei, T. J. Lim, and C. Cheah, “MMSEbased linear parallel interference cancellation in CDMA,” in Proc. IEEE
Int. Symp. Spread Spectrum Tech. Appl., Sun City, South Africa, Sept.
1998, pp. 917–921.
[35] Y. Nesterov and A. Nemirovskii, Interior-Point Polynomial Algorithms
in Convex Programming. Philadelphia, PA: SIAM, 1994.
TAN et al.: CONSTRAINED ML DETECTION IN CDMA
[36] M. Aganacic, “Variational inequalities and generalized complementarity
problems,” Dept. Operations Res., Stanford Univ., Stanford, CA, Tech.
Rep. 78-11, Sept. 1978.
[37] P. H. Tan and L. K. Rasmussen, “Linear interference cancellation in
CDMA based on block iterations,” in Proc. IEEE Vehicular Technology
Conf. Spring 2000, Tokyo, Japan, May 2000.
, “Linear interference cancellation in CDMA based on iterative
[38]
techniques for linear equation systems,” IEEE Trans. Commun., vol. 48,
pp. 2099–2108, Dec. 2000.
[39] D. Divsalar, M. K. Simon, and D. Raphaeli, “Improved parallel interference cancellation for CDMA,” IEEE Trans. Commun., vol. 46, pp.
258–268, Feb. 1998.
[40] S. Sumei, L. K. Rasmussen, T. J. Lim, and H. Sugimoto, “A hybrid interference canceller in CDMA,” in Proc. IEEE Int. Symp. Spread Spectrum Techniques and Applications, Sun City, South Africa, Sept. 1998,
pp. 150–154.
[41] M. Sawahashi, H. Andoh, and K. Higuchi, “Interference rejection weight
control for pilot symbol-assisted coherent multistage interference canceller using recursive channel estimation in DS-CDMA mobile radio,”
IEICE Trans. Fundamentals, vol. E81-A, pp. 957–970, May 1998.
[42] H. Sugimoto, K. L. Cheah, T. J. Lim, L. K. Rasmussen, and S. Sumei,
“Performance of hybrid interference canceller with zero-delay channel
estimation for CDMA,” in Proc. IEEE Globecom’98, Sydney, Australia,
Nov. 1998, pp. 265–270.
[43] H. Seki, T. Toda, and Y. Tanaka, “Low delay multistage parallel interference canceller for asynchronous DS/CDMA systems and its performance with closed-loop TPC,” in Proc. Third Asia-Pacific Conf. Communications, Sydney, Australia, Dec. 1997, pp. 832–836.
[44] X. Zhang and D. Brady, “Asympototic multiuser efficiencies for decision-directed multiuser detectors,” IEEE Trans. Inform. Theory, vol. 44,
pp. 502–515, Mar. 1998.
[45] D. Guo, L. K. Rasmussen, and T. J. Lim, “Linear parallel interference
cancellation in long-code CDMA multiuser detection,” IEEE J. Select.
Areas Commun., vol. 17, pp. 2074–1081, Dec. 1999.
[46] D. Guo, L. K. Rasmussen, S. Sun, and T. J. Lim, “A matrix-algebraic
approach to linear parallel interference cancellation in CDMA,” IEEE
Trans. Commun., vol. 48, pp. 152–161, Jan. 2000.
[47] L. A. Hageman and D. M. Young, Applied Iterative Methods. New
York: Academic, 1981.
[48] R. M. Buehrer, “On the convergence of multistage interference cancellation,” in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific
Grove, CA, Oct. 1999, pp. 634–638.
153
Peng Hui Tan (S’00) received the B. Eng. and M.
Eng. degrees in electrical and electronic engineering
from National University of Singapore in 1998
and 1999, respectively. He is currently working
toward the Ph.D. degree within the Telecommunication Theory Group in the Department of
Computer Engineering, Chalmers University of
Technology,Gothenburg, Sweden.
Lars K. Rasmussen (M’93) was born on March
8, 1965, in Copenhagen, Denmark. He received the
M.Eng. degree from the Technical University of
Denmark, Lyngby, in 1989, and the Ph.D. degree
from Georgia Institute of Technology, Atlanta, GA,
in 1993.
From 1993 to 1995, he was at the University of
South Australia, Adelaide, Australia. From 1995 to
1998, he was with the Dentre for Wireless Communications at the National University of Singapore. He
is currently an Associate Professor at Chalmers University of Technology, Gothenburg, Sweden.
Teng J. Lim (M’95) was born in Singapore on May
4, 1967. He received the B.Eng. degree in electrical
engineering from the National University of Singapore in 1992 and the Ph.D. degree from Cambridge
University, Cambridge, U.K., in 1995, in the area of
IIR filtering for acoustic echo cancellation.
Since September 1995, he has been with the Centre
for Wireless Communications, Singapore, where he
is now a Senior Member of Technical Staff and leads
the Signal Processing Strategic Research Group.