I EEE J OURNAL ON SELECTED AREAS I N COMMUNICATIONS. VOL. 8. NO. 4. MAY 1990
A Family of Suboptimum Detectors for Coherent Multiuser Communications ZHENHUA XI E, ROBERT T. SHORT. A ND CRAIG K. RUSHFORTH Abstract-In this paper we consider a class of suboptimum detectors for data transmitted asynchronously by K users employing direct se- quence spread spectrum multiple access (DS/SSMA) on the additive white Gaussian noise (AWGN) channel. The general structure of these detectors consists of a bank of matched filters, a linear transformation that operates on the matched-filter outputs, and a set of threshold de- vices. The linear transformations are chosen to minimize either a mean squared error or a weighted squared error performance criterion. Each detector can be implemented using a tapped delay line. The number of computations performed per detected bit is linear in K in each case, and the resulting detectors are thus much simpler than the optimum detector. Under typical operating conditions, these detectors will per- form much better than the conventional receiver and often nearly as well as the optimum detector. I . I NTRODUCTI ON E consider in this paper a coherent asynchronous W K-user DS/SSMA system for transmitting signals on the additive white Gaussian noise channel. The re- ceiver makes symbol estimates using a detector that con- sists of a bank of matched filters followed by a decision algorithm. Two well-known detectors of this type are the conventional receiver, which simply compares each matched-filter output to a threshold, and the maximum- likelihood (ML) sequence detector whose decision algo- rithm is the Viterbi algorithm [ 1 1-[4]. The complexity of the ML detector grows exponentially with K, and is thus impractical unless the number of users is quite small. At the same time, the performance of the conventional re- ceiver deteriorates rapidly as the number of users in- creases. We are therefore led to study suboptimum detec- tors that are easier to implement than the ML receiver but that perform much better than the conventional receiver. Some examples of suboptimum detectors that have been previously studied are a sequential decoding algorithm [ 5 ] , a decision-feedback equalizer [6], 171 for asynchronous DS/SSMA systems, and an optimized linear multiuser de- tector for synchronous DS/SSMA systems [SI . In this paper, we consider a class of suboptimum de- tectors for the asynchronous DS/SSMA system whose de- Manuscript received February 21, 1989; revised September 18. 1989. This work was supported by the Unisys Corporation under the University of Utah Contract 5-20516. This paper was presented in part at MILCOM '89, Boston, MA, October 15-18, 1989. Z. Xie and C. K . Rushforth are with the Department of Electrical En- gineering, University of Utah, Salt Lake City, UT 841 12. R. T. Short is with Communication Systems Division. Unisys Corpo- ration, Salt Lake City, UT 841 16. IEEE Log Number 9034793. cision algorithms consist of a linear transformation T fol- lowed by a set of threshold devices. This approach is motivated by equalization techniques developed for chan- nels with intersymbol interference [ 111 and by the ap- proaches taken in [6] and [SI. Because of the similarities between the two problems, it should not be surprising that techniques which are effective in combatting intersymbol interference can also be used to advantage in the multi- access problem. In addition to the obvious similarities, however, there are some important differences. For ex- ample, the near-far problem (i.e., the problem of signif- icantly different user powers) encountered in multiple-ac- cess communications has no counterpart in the intersymbol interference context. Moreover, the system designcr can typically exercise more control over the level of interference in designing a multiple-access system through his or her choice of signature sequences than would be possible in the intersymbol interference prob- lem. Thus, we might reasonably expect suboptimum mul- tiple-access receivers to perform well under a broader range of conditions than their intersymbol-interference counterparts. We obtain two different versions of T using two differ- ent performance criteria: minimum mean squared error and weighted least squares. These choices, though not op- timum in terms of bit-error probability, are mathemati- cally tractable and lead to elegant and simple detection structures that can be implemented using tapped delay lines. These structures have computational complexities per detected bit which are linear in K, and are thus much simpler than the optimum detector. This result rests on the assumption that the parameters of the system have been computed and are fixed. The practical problems as- sociated with estimating the parameters of the system and adapting the structure of the detector must be faced re- gardless of the decision rule adopted and thus do not ap- preciably affect the comparisons we make. Our initial results are based on the assumption that the linear transformation operates on the entire received waveform to estimate the entire transmitted sequence. This approach requires too much memory and entails too much decoding delay to be practical, so we next consider some modified algorithms that have small fixed decoding delays. We also discuss appropriately modified versions of two schemes that have been widely used to combat in- tersymbol interference: the linear equalizer and the deci- sion-feedback equalizer. 0733-87 16/90/0500-0683$01 .OO @ 1990 IEEE 684 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS. VOL. 8. NO. 4. MAY 1990 Matched Filter Bank In Section 11, we review the DS/SSMA signaling scheme and present a discrete model for its analysis. The minimum mean squared error (MMSE) detector, its per- formance, its implementation, and various suboptimum modifications of it are developed and discussed in Section 111. The computational complexity of the MMSE detector is shown to be 3K multiplications/bit. In Section I V, the linear equalizer is derived and its performance is ana- lyzed. One common feature of the MMSE detector and the linear equalizer is that the preliminary estimate of the transmitted bit sequence obtained using the linear trans- formation T is biased. This complicates the analysis and leads to a performance that depends on the interfering sig- nal power. The weighted least squares (WLS) detector de- scribed in Section V avoids this problem by providing an unbiased estimate of the transmitted sequence. The com- putational complexity of the WLS detector is once again 3K multiplications /bit, and its bit-error probability and asymptotic efficiency are independent of the interfering users powers. A natural suboptimum implementation of the WLS de- tector yields the well-known decision feedback equalizer [6], which we discuss in Section VI. In Section VII, we summarize the results of several computer simulations conducted to illustrate the performances of the detectors described in this paper and to compare them to the per- formances of the conventional receiver and the optimum (ML) receiver. In many circumstances of interest, the re- ceivers described here perform much better than the con- ventional receiver and nearly as well as the more compli- cated ML receiver. Dension Algorithm + 11. PRELIMINARIES We consider BPSK transmission through a common AWGN channel shared by K asynchronous users employ- ing DS/SSMA, as illustrated in Fig. 1. The received sig- nal r ( r ) can be written in the form 131 M K r ( t ) = C C b , ( i ) ~ , ( t - i ~ - 7 ! , ) + n ( r ) 1 = I ,=I MK = C h 1 1 1 ) ( r ( 4 ) %11l , ( f - r ( m) T 111 =I - 7 , ( 1 1 1 ) +n( r ) ( 2. 1) where n ( t ) is additive white Gaussian noise with two- sided power spectral density N 0 / 2 , k ( m ) - 1 =m mod K , ~ ( m ) - 1 is the integer part of m/K, and M is the number of bits transmitted by each user. b, ( i ) E {- I , 1 } is the ith transmitted bit of the kth user, S, ( r ) =J ~ w , U!, ( 1) COS ( act +0, ), t E [o, T ) ( 2 . 2 ) is the signature waveform of the kth user, a, ( r ) is the spreading signal of the kth user normalized to unit power, Fig. I . Systemmodel for asynchronous DSiSSMA communications. carrier phase, a, is the common carrier frequency, and w!, is the received signal power of the kth user. The powers, phases, and time delays of all users are assumed to be known, and without loss of generality the users are or- dered in such a way that the time delays satisfy 0 I T~ I I T~ <T. In practice, these system parameters must of course be estimated and continually updated, a problem that we are currently studying. The spreading signal a, ( t ) , which is used to reduce multiuser interference, is a signal of duration T seconds that can be written in the form L ( r ) = ut ~pTf ( I - ( m - (2.3) 111 =I where pT, ( t ) is the spreading chip waveform whose du- ration is T, =T / L seconds and { at , E ( - 1, is the spreading sequence of the kth user. The assumption regarding the duration of the signature waveform has been made almost universally by others working on this prob- lem [l ], [ 2 ] , [ 3 ] , and our results show that it does not seriously limit multiple-access performance. If additional protection against jamming or unauthorized interception were required, the generalization would be analytically straightforward, although the implementation would be somewhat more complicated. The matched-filter output y, ( 1,1 ) ( 7 ( m ) ) associated with the k(m)th user in the r(m)th bit interval is given by [3] ( 9( 11l ) + l ) T +T i ( l r l I J h d ~ ( ~ ) ) =i7,,),lr+,h r ( f ) %O, I , ( t - 7 ( m) T - Q , I 1 1 , ) dr 111 +K - I = b m ( T ( i ) ) K (,,I 1 !, ( 1 , ( r ( m 1 ! = ! t i - K + l - r ( 4 ) +% 1 1 1 ) ( d ~ ) ) (2.4) where m H1,(m) =1 s , ( r - s,(t +mT - 7,) dr (2.5) is the signal crosscorrelation function. We see that y, (7 ( m ) ) depends upon the transmitted bits, the sig- -m rk is the time delay of the kth user, 0, is the kth users nal crosscorrelations, and the noise. XI E (' 1 ( I / . : SUBOPTI MUM DETECTORS FOR MUL TI USER COMMUNI CATI ONS 685 Using vector notation, it is not difficult to show that the MK matched-filter outputs yL(,,! ( q ( t n ) ) can be expressed as [ I O] y =PMb +n (2.6) where y(i ) =[yl (i >, y2(i>, . * , Y K ( i ) l T ~ R ~ , b( i ) =[bl (i ), b2(i ), * * * , bK (i )l TE {- I , I I ", n =[ n ( l)', n(2)', * . * , n(M)']' E RMK, y =[y( I )', y(2)', * * . , y(M)']' E RMK, b =[ b( l ) ' , l ~( 2) ~, * . , ~(M)']'E {- 1 , I } MK , n( i > =[nl (i >, n2(i ), . , nK(i )]'E R ~ , and PM = H( 0 ) H(1f 0 H ( l ) H ( 0 ) H( 1) ' 0 0 . . . 0 H( 0 0 . . . 0 - - 0 0 . . . . . . The vector y is a sufficient statistic for estimating the transmitted bits b. The elements of all vectors are ordered in accordance with their relative appearances in time. PM is a symmetric matrix which we assume to be positive definite and hence invertible, but most of the results we present can be easily generalized. All decision algorithms considered in this paper com- prise two steps. First, a linear estimate b =Ty of the transmitted bits b is obtained from the matched-filter out- put y. The constraint that b E {- 1 , 1 } is dropped in this process and arbitrary real-valued estimates are allowed. Second, the components of the estimate b are compared to a threshold of zero, and the Cnal bit estimates are taken to be the components of sgn [ b]. 111. THE MMSE DETECTOR We first study the linear minimum-mean-squared-error (MMSE) detector. Formally, the problem can be stated as follows: first a mapping T: R,"" --t RMK such that the per- formance criterion E {( b - b ) ' ( b - 8 ) }is minimized, where the estimate b is given by b =Ty. The mapping that achieves this minimum is T =( P M +NO/2Z)-'. ( P M +N, / Wb =y, ( 3. 1 ) In practice, we could estimate b by solving the linear equation ( 3 . 2 ) a process that can be carried out efficiently using LU de- composition, forward elimination, and back substitution [ 1 I] by the system shown in Fig. 2. The inputs are the MK matched-filter outputs y, the outputs are the estimated bits sgn [ b ] , and the L, and U, are matrices that arise dur- ing the process of block LU decomposition [ 12, p. 11 1 1 . The basic operations of matrix-vector multiplication and vector addition can be simply implemented using a tapped- delay-line architecture. To detect MK transmitted bits re- quires 3 MK2 multiplications. Therefore, the complexity of this detector is 3 K multiplications/bit, which is linear in K and is independent of the transmission length M. In the absence of noise, the MMSE estimate becomes b =PGly. At the other extreme, i.e., when No >>w, for all j , T reduces to the identity mapping and the MMSE detector reduces to the well-known conventional receiver. A. Performance of the MMSE Detector We now consider the performance of the MMSE detec- tor. The performance criteria we are the bit-error prob- ability and the asymptotic efficiency as defined by Verdu We show in Appendix A that the probability that the ith 141. bit of the kth user is detected in error is given by c p,MMSE(i) =2 - MK + I h l , l ( V ( / l I { - 1 . 1 ) ( 3 . 3 ) where a is the [ ( i - 1 ) K +k]th diagonal entry of ( PM is the [ ( i - l ) K +k]th row of ( PM +iVo/2Z)-'flM, and +NO/2Z)-I PM( PI z . I +N0/2Z)-I 3 [gl, g,, . * * 9 gMK 1 dv. e - ( u ' / 2 1 Q ( x ) =- & I sm Each term in the sum in ( 3. 3) is the error probability for the ith bit of the kth user, conditioned on a particular combination of the remaining bits. Each such combina- tion is equally likely, thus accounting for the factor , and the sum is taken over all 2 M K - I such com- binations. Verdu [4] defines the asymptotic efficiency of the kth user, whose bit error probability is Pk, to be qk =sup 0 I r 2 - MK +I { I 1 1 limo+O Pk(u)/Q[(m;L)"L/u] <+ CO] . ( 3. 4) To determine the asymptotic efficiency qpMSE of the MMSE detector, we note that the dominant term in (3. 3) as No -+ 0 is Q 2 - MK+ I ~ 686 I EEE J OURNAL ON SELECTED AREAS IN COMMUNI CATI ONS. VOL X. NO 4. MAY I990 It follows that Fig. 2 . MMSE and WLS detector architecture 6 (3.5) V pMSE =max2 Equations (3.3) and (3.5) characterize the performance of the MMSE detector. We see that ypMSF is, in general, dependent on the interfering signal power. This depen- dence is a consequence of the fact that the estimate b = Ty defined by (3.2) is biased. To compare the performance of the MMSE detector with that of the conventional receiver, we consider the special case for which No <<w, for all j . We then have ( O M +No/2Z)-I =picl', and (3.5) can be simplified to 1 p S E = . (3.6) Asi mpl ecal cul ati onofthe[(i - 1) K + k, ( i - 1) K + k]th cofactor and the determinant of OM shows that the denominator in (3.6) is independent of the interfering sig- nal power. In contrast, the asymptotic efficiency of the canventional receiver decreases monotonically as the power in the interfering signal increases [4]. The advan- tage to the MMSE detector can be substantial. To illustrate, we consider a synchronous two-user DS/SSMA system. In this case, we have H ( 1 ) =0 and wA ( f i . ' ) , , - , , K+, . , , - I ) K + , Fig. 3 shows plots of the asymptotic efficiency of the first user as a function of the ratio of the two signal powers for the conventional receiver, the ML receiver [8], the MMSE detector, and the WLS detector which will be discussed in Section V. In all cases, we have pI =8 dB and Hl ,,(0) =0.3. These plots show that when the interference is small, i.e., when w2 -+0, the asymptotic efficiency of the MMSE detector is the same as that of the conventional receiver. In the presence of strong interference, i.e., w2 \ \ , -20 -10 0 10 20 0.0 lologlo(pz/Pl) Fig. 3. Asymptotic etficiencies of ML receiver, conventional receiL-er. MMSE detector. and WLS detector i n a two-user hynchronous DSiSSMA \ystem. -+ W, V l MMSE 2. 1 - Hl ,,(0)2, a constant independent of p ?, whereas qf"" approaches zero. B. Suboptimum Implementation The MMSE detector described above operates on the entire sequence at once. When M is large, as it will almost always be in practice, the resulting detection delay will be unacceptably large. Therefore, the implementation shown in Fig. 2 must be modified to incorporate a prac- tical constraint on the delay. One obvious possibility is to divide the entire sequence of M blocks into subsequences, each I blocks long, and then to detect these subsequences one by one as in Fig. 2. Some modifications could be introduced to reinforce the connection between the subsequences. For example, the initial condition b ( 0 ) in Fig. 2 could be provided by the already reconstructed symbols, and a hard-limited version of y ( I +1 ) could be used in place of b( M +1 ). The interconnection between the sections could be further reinforced by overlapping. Equation (3.6) will no longer be true for the subopti- mum scheme described above, and its asymptotic perfor- mance will depend on the power in the interfering signal. Because of the nature of the multiuser interference terms. XIE PI U / . . SUBOPTIMUM DETECTOKS FOK MULTIUSkK COMMUNICATIONS 687 it is reasonable to expect this type of behavior for any detection scheme that operates on only a subset of the matched-filter outputs. IV. LI NEAR EQUALI ZER I n this section, we formulate the MMSE detection prob- lem under a constraint that the detector delay be finite, say approximately J KT seconds with J <<M. Formally, this corresponds to the following: find the mapping T: R ' 2 J + 1 ) K +RK such that !he performance criterion ?{ ( b ( i ) - 6(i))T(b(i) - b ( i ) ) } is minimized where b ( i ) =Ty. The ( 2 5 +l)K-dimensional matched-filter outputvectoryisdefinedasy =[ y ( i - J ) ' , y ( i - J + 1 ) T, * '. This approach produces a var- iant of the linear equalizer frequently used to combat in- tersymbol interference [ 1 1 1 . For i +J <M and i - J >0, y can be expressed as , y ( i +J ) y =PZJ+lb +n +Pz (4.1 ) where b =[ b ( i - J ) r , b ( i - J +I )', * , b ( i + 0, * . . , 0, b ( i +J + l ) T ] T , P 2 J + I is defined as in ( 2. 7) with the proper di- mension, and J y I T , z =[ b( i - J - H(1) 0 . - . 0 P = [: ... 1. (4.2) The term Pz in (4.1) is a consequence of the edge effects associated with previous and future bits outside the ob- servation window. * - H( l ) T The optimizing transformation in this case is T = [ O , ~ ~ ~ O , H ( l ) , H ( 0 ) , H ( l ) T , O , e * - , 0 ] which is well defined because the matrix in parentheses is positive definite. Calculation of the estimate b( i) requires ( 2 5 +1 ) K2 multiplications; the computational complex- ity of the linear equalizer is thus ( 2 5 +1 ) K multiplica- tions/bit, which is linear in both K and J . Since J is usually chosen to be greater than one, the linear equalizer requires more computation than the sub- optimum MMSE detector. However, its performance is also expected to be somewhat better than that of the sub- optimum MMSE detector. To see this, we neglect the term PP' in (4.3) and write T [ 0, * * , 0, I , 0, . . . , 01 ( P ~ J + I +No / 2 I ) , (4.4) from which the primary difference between the linear equalizer and the suboptimum LMS detector can be de- duced. In the suboptimum LMS detector, the ( 2 5 +l ) K estimated bits [ b ( i - J ) ' , b ( i - J +I ) ' , . * , b ( i + J ) '1 Tare obtained using the ( 2 3 +1 ) K-dimensional in- Fig. 4. Linear equalizer. put vector y, while in the linear equalizer only the K bits b ( i ) are estimated using ;he same input y and a similar algorithm. The quality of b( i ) is apt to be better than that of b( i k j ) f or j = 1,2, **.J becauseofedgeeffects. One possible implementation of the linear equalizer is shown i n Fig. 4. This implementation consists of a trans- versal discrete-time filter with a finite delay to account for the inherently noncausal nature of the algorithm. Since the linear equalizer uses only a portion of the matched-filter outputs, its asymptotic performance is de- pendent on the power in the interfering signal because of the edge effects discussed earlier. V. THE WLS DETECTOR As we have seen, both the MMSE detector and the lin- ear equalizer produce preliminary estimates of the trans- mitted bits that are biased. One important consequence of this fact is that the performances of these two detectors depend upon the interfering signal power. To avoid this problem, we take the likelihood function f ( y 1 b ) as an alternative performance criterion. Since the matched-filter output y is Gaussian with conditional mean P,b and co- variance matrix ( N0/ 2) P, , maximizing the likelihood function is equivalent to minimizing Q =( Y - P M b ) ' P G ' ( Y - P d ) . ( 5 . 1 ) In order to avoid confusing the detector that minimizes (5.1) with the nonlinear ML sequence detector, we call the former detector the weighted least-squares (WLS) de- tector. The vector that minimizes Q is b =Oi l y. ( 5 . 2 ) Once again the estimation problem reduces to solving the linear equation P,b =y. This WLS detector was pro- posed previously by Lupas and Verdu [ 8] as a "decorre- lating detector" in a study of the synchronous DS/SSMA problem. We are grateful to an anonymous reviewer for calling our attention to further results of Lupas and Verdu on the asynchronous problem [ 9 ] , [I O]. and to Professor Verdu for subsequently providing us with a preprint of [I O]. I n view of the overlap between these results and our own, our discussion of the WLS detector will be brjef. Since y =P,b +n, it follows from ( 5. 2) thaLb =b +/ 3i 1n, and thus that the preliminary estimate b of the transmitted bit sequence is unbiased. One consequence of this property is a performance that is independent of the interfering signal power. 688 IEEE JOURNAL ON SELECTED AREAS I N COMMUNI CATI ONS. VOL 8. NO 4. MAY 1990 As in the case of the MMSE detector, the estimate of (5.2) can be efficiently determined using block LU de- composition followed by forward and backward substi- tution [12]. The system shown in Fig. 2 can also be used to implement the WLS detector, and the computational complexity of the WLS detector is 3 K multiplica- tions /bit. In a manner similar to that described in Appendix A, i t can be shown that the probability that the ith bit of the kth user is in error is a great simplification over the expressions for PpMSE( i ) and PkE(i ). Furthermore, PyLs( i ) is independent of the interfering signal power [8]. The asymptotic efficiency of the WLS detector is which is also independent of the interfering signal power and is often substantially superior to the efficiency of the conventional receiver. This result is identical to that ob- tained for the MMSE detector when No <<wj for all j . The asymptotic efficiencies of the first user in a two- user synchronous DS/SSMA system employing the ML detector, the conventional receiver, the MMSE detector, and the WLS detector, respectively, are plotted as func- tions of p 2 / p I in Fig. 3 . As we have already noted, qyLs =1 - H, , , ( O) * is a constant independent of p 2 / p I for a given cross-correlation coefficient. As p 2 +03, qrMSE =qyLs. We further observe that there is a value of p 2 , representing the worst condition for the ML detec- tor, at which the asymptotic efficiencies of the ML detec- tor and the WLS detector are equal [8]. As we pointed out in connection with the MMSE de- tector, operating on the entire transmitted sequence at once entails an unacceptable delay and must be avoided. A sub- optimum version of the WLS detector can be imple- mented in essentially the same way as previously de- scribed. Because of edge effects, the asymptotic efficiency and the bit-error probability of this partitioned scheme will depend on the interfering signal power. VI. DECI SI ON FEEDBACK EQUALI ZER To obtain an alternative suboptimum implementation of the WLS detector, we rewrite (5.2) in the form i - I I 1 w Fig. S . Decision feedback equalizer f ori =1, 2, - , MK. The form of (6.1) makes i t clear that we can regard the WLS detector as a cancellation scheme. Because the multiuser interference is noncausal, (6.1) cannot be solved exactly in a sequential fashion. The estimate of b, (7 ( i ) ) depends upon the estimates of both past and future bits, and the entire observed se- quence must be processed at once. An obvious alternative is to make some preliminary de- cisions regarding the future bits, and then to use these preliminary estimates in (6.1). If these preliminary deci- sions are very accurate, this scheme will perform nearly as well as the optimum singer-user system because the multiuser interference will be almost completely can- celled. I n practice, however, there will be some perfor- mance loss because of inaccuracies in the preliminary de- cisions and the consequent imperfect cancellation of the interference. One way to provide the preliminary decisions for b, ( , f l ) ( ( m ) ) is to make hard decisions on the correspond- ing matched-filter outputs; i.e., to use sgn [ y k , f , r ) ( q ( m ) ) l as a preliminary estimate for b, ( 1 , 1 ) ( 11 ( m ) ). The resulting scheme is a form of the well-known decision-feedback equalizer (DFE) [6], [7], which was originally proposed to combat intersymbol interference [ 1 11. Because of the similarities between multiuser interference and intersym- bo1 interference, it seems reasonable that an appropriate version of the DFE would be an effective detector in the former case as well as in the latter. From (6.1), we see that the DFE can be implemented using feedback and feedforward filters as shown in Fig. 5 . The inputs to the feedback filter are the previously es- timated symbols, while the inputs to the feedforward filter are the symbols obtained from the preliminary decisions. The feedforward filter is anticausal because its input is derived from the matched-filter outputs J,,,~! ) ( q ( m ) ) for m =i +1, , i +K - 1 . For the binary antipodal signaling scheme considered here, the DFE is a multipli- cation-free structure with a computational complexity of 2 K additions per bit. Since the DFE is a nonlinear estimator, simple closed- form expressions for the bit-error probability are difficult to obtain. It is possible to find bounds and approxima- tions, but these tend to be either computationally inten- sive or grossly inaccurate 161, [7], [ 1 1 1 . Moreover, an ex- act analysis of the asymptotic efficiency of the DFE seems difficult and is omitted here. Consequently. the most ef- fective way of examining the performance of the DFE is through simulation. We describe the results of several simulations in the next section. VI I . SI MULATI ONS To provide a basis for comparing the various detectors discussed in this paper, we conducted an extensive series of Monte-Carlo simulations. The schemes we evaluated were finite-delay versions of the MMSE and WLS detec- tors, each with subsequence length I =9 K and an overlap of K bits between adjacent subsequences; a linear equal- izer with J =4; the DFE; the conventional receiver; and the ML sequence detector. In all cases, the modulation was equiprobable BPSK with rectangular bit and chip waveforms. In cases for which the ML receiver was too complex to simulate, we used the performance of the sin- gle-user system to provide a bound. Among the examples studied were two asynchronous DSISSMA configurations with K =2 and 18 and spread- ing codes of lengths S and 127, respectively. The cross- correlation coefficients in the two-user system were taken to be H1,?(0) =0.3 and HI, ?( 1 ) =0.1, and the code sequences for K = 18 were taken from [ 131. We used relative time delays of 0.05 ( i - 1 ) T, i =1, 2, . . . 18, for the eighteen-user system, and we set all its phase lags to zero. Fig. 6 shows plots of the average bit-error probabilities of several different receivers as functions of the signal-to- noise ratio for K =18. In this example, the powers of all users are equal. Fig. 7 shows plots of the bit-error prob- ability of the first-user versus the power of the interfering user in the two-user asynchronous system to illustrate the near-far capabilities of the various detectors. These re- sults are typical of the many configurations we simulated. From these plots, and from the many other simulations we conducted, we make the following observations. First, all the suboptimum detectors proposed in this paper per- form much better than the conventional receiver and nearly as well as the ML receiver under a wide variety of conditions. Second, these detectors are quite robust in the face of widely different signal powers. The linear equal- izer and the DFE perform somewhat better than the sub- optimum finite-delay versions of the MMSE and WLS de- tectors. As predicted, the DFE is more robust than the linear equalizer in the face of widely different signal power levels. To compare these results to those obtained previously using a sequential decoding algorithm [SI, we plot in Fig. 8 the bit-error probability achieved in the eighteen-user configuration using the linear equalizer, the DFE, and the sequential decoding algorithm. We see that these three detectors exhibit about the same performance. The advan- tage of the detectors studied in this paper, as compared with the sequential decoding algorithm, is their simpler structure. Their simplicity, combined with their excellent performance as demonstrated by these examples, makes them very attractive practical algorithms. VI I I . CONCLUSI ONS The primary contribution of this paper is the develop- ment and evaluation of a family of suboptimum DS/SSMA Conve nud Receiver opunum Single-Usa Detector Suboptimum WLS Detector Suboplimum MMSE Detector Decision Feedkk Equalizer 10- 0 1 2 3 4 5 6 7 8 9 Fig. 6 . Bit-error probability for conventional receiver, optimumsingle-user detector, suboptimumMMSE detector. suboptimumWLS detector. lin- ear equalizer, and decision feedback equalizer with K =18 and L = 127. /.' /.' - - - - Convenuonal Receiver Subopumum ML Receiver WLS Detector Suboplmum MMSE Dewtor _ _ _ _ _ - Declsion FeedbaJ: Equalizer Llnear F4uallzer ---__ 689 XIE ~ ' f r r l SUBOPTI MUM DFTFCTORY FOR MULTI UYFR COMMUNI CATI ON\ I ~ _ _ ~~ ~ _ _ _ _ _ ~ ~ ~~~ ~~~ ~ t 1 I 3 6 9 12 15 10.. 1 Fig. 7. Bit-error probability versus interfering user's power. for conven- tional receiver, ML receiver. suboptimumMMSE detector. suboptimum WLS detector. linear equalizer, and decision feedback equalizer with K =2. L =5 . and w , / N , ) =5 dB. lo-' 4 10- ~o~oglo(wlmolo) Fig. 8. Bit-error probability for linear equalizer. decision feedback equal- izer. and sequential decoding algorithmwith K =18 and L =127. detectors whose computational complexity is only linear in the number of users and yet which perform much better than the conventional receiver and nearly as well as the ML sequence detector in many practical circumstances. The simple structures and excellent performances of these 690 l EEE J OURNAL ON SELECTED AREAS IN COMMUNI CATI ONS, VOL. 8. NO 4. MAY 1990 detectors make them very attractive alternatives to the conventional receiver and the ML detector. The results described in this paper were obtained under the assumption that all system parameters (signal phase. power, and delay) are known. I n practice, these parame- ters must be estimated and the receiver structure contin- ually modified to reflect the updated estimates. The ul ti - mate evaluation and comparison of the detectors studied here cannot be carried out without considering the effects of noisy estimates on their performances. We are cur- rently investigating this issue. APPENDI X I n this Appendix, we consider the bit-error probability of the MMSE detector. The probability that the kth user's ith bit is detected in erro; is given by pFMSE =Pr {[sgn ( TY) l , l - , ) , +, =- 1 I b , ( i ) =1 ) b, ( i ) =1 ) quences." /EI,.E Tr t r m. Coi mrt u.. vol. COM-35. pp. 87-98. J an. 1987. . 131 S. Verdu. "Miniinurn prohability of error for asynchronous Gaussian multiple-access channels." / FEE Trti i i .!. /fifitrrti. Tlioor?, vol. IT-32. pp. 85-96, J an. 1986. 141 -. "Optimum inultiuser asymptotic eflicicncy." l EEE Trctm. Cornmuti.. vol. COM-34, pp. 890-897. Sept. 1986. IS] Z. Xie, C. K. Rushforth, and R. T. Short, "Multi-user signal detec- tion using sequential decoding." l EEE Trutis. Cotntnun., vol. 37, 1989. 161 R. T. Short, "Multiple user receiver structures." Ph.D. dissertation. Dcp. Elcc. Eng.. Uni v. Utah. Dec. 1988. 171 M. K . Varanasi and B. Aazhang. "An iterative detector l o r asyn- chronous spread-spectrum multiple-access syateins," i n Proc.. 181 R. Lupas and S. Vcrdu, "Linear multiuser detectors for synchronous code-division multiple-access channels." / EEE Trtrris. /r!fitriti. T l i ~ or y , vol. 35, pp. 123-136, J an. 1989. 191 R. Lupas and S. Verdu, "Optimum near-far resistance of linear de- tectors for code-division multiple-access channels,"in Proc. I nf . Symp. Inform. Theorv, J une 19-24, 1988, Kobe. J apan. p. 14. 1101 -. "Near-far re\istance of linear detectors for code-division mul- tiple-access channels." / EEE Truris. Conirtiuu., vol. COM-37, 1989. [ I I I J . G. Proakis, Di gi f t i / Co,r i r t r i oi i c.t r r i t ~r i . New York: McGraw-Hill. 1983. [ 121 G. H. Goluh and C. F. Van Loan. Mt i rri i Compuftrfioti.\. Baltimore. MD: The J ohns Hopkins University Press, 1983. [ 131 F. Gebhardt and C. L. Weber. "Aperiodic correlation properties of pseudonoise codes." Tech. Rep., USCEE-430. Dcp. Elec. Eng.. Uni v. Southern California. Oct., 1972. GLOBECOM'88. Hollywood. FL. NOV. 1988, pp. 556-560. Zhenhua Xie wa\ born i n Zhejidng, China, on J uly 15, 1958 He received the B S degree i n electrical engineering fromZhejiang Univer\ity, China. i n 1982, and the M S dnd Ph D degrees in electrical engineering from the Univer\ity ot Utah. i n 1985 and 1989, respectively He I\ currently d po\t-doc fellow in Electrical Engineering at the University of Utah Hi5 re- search interest\ include digital signal proces\ing, vision. and multiu\er communication\ where ( . ) I symbolizes the the kth element of the vector inside the parentheses. Since the noise component [ ( PM +N0/2Z)-'nl cl - is Gaussian with zero mean and of E { Pw +N 0 / 2 N ' nnT( f i w +N , ) / 2 C } variance equal to the [ ( i - 1 ) K +k]th diagonal element = ( Ow +&/ 2Z)- ' P,( @, VI +NI ) / ~Z) - ' , ( A. 2) L PyMSE(i ) can be expressed as a sum of Q-functions, where Specifically, if we denote the [ ( i - 1 ) K +k]th diagonal entry of the matrix in (A.2) as NU/ 2 a and the [ ( i - 1 ) K +k]th row ofthe matrix ( PM +N0 / 2 Z )-'Pwas [gI, g, , * * , &,,I, then p,MMsE(i can be written as c Q pY M S E ( j ) =2-MK+I (A.3) h!.l,l(V( / ) ) E ( - 1 . 1 ) of Electrical Engineerii research interests lie i n cessing. Robert T. Short was born i n Boulder, CO. on May 8, 1954. He received the B.S. degree i n elec- trical engineering from New Mexico State Uni- versity i n December of 1975. He worked for Motorola Government Electron- ics Division, Scottsdale. AZ, (1976-1981). Hew- lett-Packard Corporation, Fort Collins, CO (1981- 1984). and Unisys Corporation, Salt Lake City, UT (1984-1989). before receiving the Ph.D. de- gree in electrical engineering in December of 1988. He is now on the faculty in the Department ng at the University of Utah i n Salt Lake City. His the areas of communication theory and signal pro- which can, in principle, be calculated if ( p,,, +N0 / 2 Z ) - ' is given. REFERENCES I I ] M. B. Pursley, D. V. Sarwate. and W. E. Stark. "Error probability for direct-sequence spread-spectrum multiple-access coinmunica- tions-Part I : Upper and lower bounds." /FEE Trtrris. Cortirtlrtrr. . vol. 121 J . S. Lehnert and M. B. Pursley. "Error probability tor binary direct- sequence spread-spectrumcommunication with randomsignature se- COM-30. pp. 975-984. May 1982. Craig K. Rushforth was born in Ogden. UT. He received the B.S.. M.S., and Ph.D. degrees i n electrical engineering from Stanford University, Stanford. CA. i n 1958, 1960. and 1962. respec- tively. He has served on the facultieb of Utah State University and Montana State University and has held research positions at Stanford Research I n- stitute. the Institute for Defense Analyses. and ESL. Inc. He has been with the Department of Electrical Engineering at the University of Utah since 1974. He has served as Department Chairman from 1982 to 1985, and from 1988 to the present. His research interests lie in communication theory and signal processing. with current emphasis on multiple-access communications. coded modulation. VLSI implementation of algorithms. and signal restoration.