Enhanced subspaced approach to interference mitigation

Pei Xiao, Wu Yin, Rahim Tafazolli, Sherif Welsen Shaker

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we study an enhanced subspace based approach for the mitigation of multiple access interference (MAI) in direct-sequence code-division multiple-access (DS-CDMA) systems over frequency-selective channels. Blind multiuser detection based on signal subspace estimation is of special interest in mitigating MAI in CDMA systems since it is impractical to assume perfect knowledge of parameters such as spreading codes, time delays and amplitudes of all the users in a rapidly changing mobile environment. We develop a new blind multiuser detection scheme which only needs the priori knowledge of the signature waveform and timing of the user of interest. By exploiting the improper nature of multiple access interference (MAI) and intersymbol interference (ISI), the enhanced detector shows clear superiority to the conventional subspace-based blind multiuser detector. The performance advantages are shown to be more obvious in heavily loaded systems when the number of active users is large.

Original languageEnglish
Title of host publication11th International Symposium on Communications and Information Technologies, ISCIT 2011
Pages13-17
Number of pages5
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event11th International Symposium on Communications and Information Technologies, ISCIT 2011 - Hangzhou, China
Duration: 12 Oct 201114 Oct 2011

Publication series

Name11th International Symposium on Communications and Information Technologies, ISCIT 2011

Conference

Conference11th International Symposium on Communications and Information Technologies, ISCIT 2011
Country/TerritoryChina
CityHangzhou
Period12/10/1114/10/11

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing

Fingerprint

Dive into the research topics of 'Enhanced subspaced approach to interference mitigation'. Together they form a unique fingerprint.

Cite this