[go: up one dir, main page]

CN1398053A - Multi-user test method for radio receiver - Google Patents

Multi-user test method for radio receiver Download PDF

Info

Publication number
CN1398053A
CN1398053A CN01120495A CN01120495A CN1398053A CN 1398053 A CN1398053 A CN 1398053A CN 01120495 A CN01120495 A CN 01120495A CN 01120495 A CN01120495 A CN 01120495A CN 1398053 A CN1398053 A CN 1398053A
Authority
CN
China
Prior art keywords
mrow
msub
math
module
soft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN01120495A
Other languages
Chinese (zh)
Other versions
CN1194478C (en
Inventor
王小东
周小波
曲秉玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB011204958A priority Critical patent/CN1194478C/en
Publication of CN1398053A publication Critical patent/CN1398053A/en
Application granted granted Critical
Publication of CN1194478C publication Critical patent/CN1194478C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Noise Elimination (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

本发明涉及一种无线接收机的多用户检测方法,用于码分多址系统简化的叠代干扰抵消接收机,可有效抑制多用户干扰,提高系统容量,特别在和译码联合的情况下,效果更好。包括:A.对应每一个用户至少设置一软输入软输出(SISO)模块及一变换模块;B.设置叠代次数M和叠代次数参量n;C.令n等于1,由SISO模块对经RAKE接收机合并输出的结果信号进行符号判决;D.根据符号判决结果对输入的经离散化后的接收信号进行并行干扰抵消并输出似然比值;E.令n增加1,由变换模块对SISO模块输出的符号判决结果进行变换后再反馈输入SISO模块,然后执行步骤D、E,直至n=M时停止。

The invention relates to a multi-user detection method of a wireless receiver, which is used for a simplified iterative interference cancellation receiver of a code division multiple access system, can effectively suppress multi-user interference, and improve system capacity, especially in the case of combining with decoding ,Better results. Including: A. Corresponding to each user, at least one soft input and soft output (SISO) module and a transformation module are set; B. The number of iterations M and the number of iterations parameter n are set; C. Make n equal to 1, and the SISO module RAKE receiver merges and outputs the result signal to perform symbol judgment; D. Perform parallel interference cancellation on the input discretized received signal according to the symbol judgment result and output the likelihood ratio; E. Increase n by 1, and the transformation module performs SISO The sign judgment result output by the module is transformed and then fed back into the SISO module, and then steps D and E are executed until n=M and stop.

Description

Multi-user detection method for wireless receiver
Technical Field
The invention relates to the technical field of wireless communication reception, in particular to a multi-user detection method in a spread spectrum communication receiver.
Background
Since the discovery of Turbo codes with superior performance, iterative processing techniques have attracted extensive attention, and reference 1[ c.berrou and a.glavieux, "Near optimal error-correcting coding and decoding: turbo codes, "IEEE Trans commu., vol.44, oct.1996" and reference 2[ c.berrou and a.glavieux, and p.thitimajshima, "Near Shannon limiterrorrection coding and decoding: turbo codes, "on Proc.1993 int. Conf. on communications-matters, PP.1064-1070, 1993 ].
Turbo codes can in principle be widely used for many detection/decoding problems, such as serial concatenated codes, joint source and channel decoding, multi-user detection of joint channel decoding, etc. An optimal Iterative multi-user detection algorithm for a synchronous code division multiple access system is obtained in reference 3[ m.moeher, "Iterative multi-user decoder for near-capacity communications," ieee trans.command, vol.46, pp.870-880, July 1998] and reference 4[ m.c.value and db.d.woerner, "Iterative multi-user detection for conditional access encoded asynchronous ds-CDMA," in proc.ieee int.symp.personal, Indoor, and Mobile radio communication-information (pimrc), Boston, MA, pp.213-217, 1998], which is based on the principle of Cross-entropy minimization.
Although a corresponding suboptimal implementation is also obtained, the complexity of its implementation is still unacceptable to a moderate number of users. In reference 5[ H.E.Gamal and E.Geraniotis, "iterative receiver detection for coded CDMA signals in AWGN and decoding channels," IEEETrans.on Selcctcd Areas in Communications, vol.18, No.1, pp.30-41, Jan.2000 ], an iterative receiver based on the MMSE criterion and the Turbo criterion is given, but also suffers from high computational complexity.
In reference 6[ x.wang, and h.v. door, "iterative (turbo) soft inter-preferential decoding and decoding for coded CDMA", IEEE trans. com., vol.47, No.7, pp.1046-1061, July 1999], a new iterative receiver based on soft-input soft-output (SISO) and a posteriori probability channel decoding was proposed. The problems of the iterative algorithm include: instead of using the Rake receiver output as input for the first iteration; is applied to a time-invariant channel and cannot be applied to a time-variant channel; a complex matrix inversion method is used and not every path of the multipath is processed.
Disclosure of Invention
The invention aims to design a multi-user detection method of a wireless receiver, which is an iterative soft interference cancellation method applied to the wireless receiver, can greatly reduce the complexity of calculation compared with the prior similar method, and can be simultaneously applied to the situations of channel coding and channel coding absence.
The technical scheme for realizing the purpose of the invention is as follows: a method for multi-user detection in a wireless receiver, comprising the steps of:
A. setting a Soft Input Soft Output (SISO) module and a transformation module corresponding to each user;
B. setting the iteration times M and the iteration time parameters n and M, n to be positive integers;
C. setting n equal to 1, and making symbol decision on the combined output result signal of RAKE receiver by Soft Input and Soft Output (SISO) module;
D. according to the symbol decision result, carrying out parallel interference cancellation on the input discretized received signal and outputting a likelihood ratio;
E. let n be increased by 1, the transform module of the Soft Input Soft Output (SISO) module transforms the symbol decision result output by the Soft Input Soft Output (SISO) module and feeds back the result to the Soft Input Soft Output (SISO) module, and then step D, E is executed until n is M.
And step A, setting K Soft Input Soft Output (SISO) modules and K transformation modules corresponding to K users, wherein each transformation module is arranged between the feedback input end and the external information output end of the corresponding Soft Input Soft Output (SISO) module and is used for processing the iterative soft input soft output of the non-joint channel coding and decoding, and the Soft Input Soft Output (SISO) module outputs the likelihood ratio.
And step A, setting K Soft Input Soft Output (SISO) modules, K de-interleaving modules, K soft input soft output decoding modules, K interleaving modules and K transformation modules corresponding to K users, wherein each transformation module is arranged between the feedback input end of the corresponding Soft Input Soft Output (SISO) module and the external assigned information output end of the corresponding interleaving module and is used for processing the iterative soft input soft output of the joint channel coding and decoding, and the soft input soft output decoding module outputs the likelihood ratio.
Said step C is based on the following formula to perform the symbol operation of taking value on the result after RAKE combination, wherein r isk,l(i) Is the L path signal h of the L path signal of the K user in the K users obtained by aiming at the ith symbolk,l(i) Is a channel estimation value of the ith symbol, <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>sgn</mi> <mo>(</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msubsup> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> <mo>*</mo> </msubsup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>)</mo> <mo>.</mo> </mrow> </math>
step E, when not combining coding and decoding superposition, the symbol decision result lambda output by the Soft Input Soft Output (SISO) module is determined according to the following formula1[bk(i)]The transformation is carried out, and the transformation is carried out, <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>tanh</mi> <mrow> <mo>(</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <msub> <mi>&lambda;</mi> <mn>1</mn> </msub> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>)</mo> </mrow> <mo>.</mo> </mrow> </math>
step E, when the joint coding and decoding superposition is carried out, the symbol decision result lambda output by a Soft Input Soft Output (SISO) module is carried out according to the following formulaP 2[bk(i)]The transformation is carried out, and the transformation is carried out, <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>tanh</mi> <mrow> <mo>(</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <msubsup> <mi>&lambda;</mi> <mn>2</mn> <mi>p</mi> </msubsup> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>)</mo> </mrow> <mo>.</mo> </mrow> </math>
said lambdaP 2[bk(i)]Is to subtract the soft input information lambda of the soft input soft output decoder from the soft output of the soft input soft output decoder1[bk(i)]The latter likelihood ratio.
In the step D, the parallel interference cancellation is performed on the input discretized received signal by removing non-l-path signals of all K users and removing l-path signals of K-K users except the K-th user, that is, only the l-path signal of the K-th user is retained, and the processing formula is as follows: <math> <mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>r</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>la</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mi>la</mi> <mo>&NotEqual;</mo> <mi>l</mi> </mrow> <mi>L</mi> </munderover> <msub> <mi>H</mi> <mi>la</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mover> <mi>b</mi> <mo>~</mo> </mover> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>H</mi> <mi>l</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </math>
wherein, b ~ ( i ) = [ b ~ 1 ( i ) , b ~ 2 ( i ) , . . . , b ~ K ( i ) ] ,
Figure A0112049500076
indicating that the k-th component is set to zero,Hl(i) Is a channel state matrix;
the step D of outputting the likelihood ratio further includes the following processing steps:
a. first, the weighted value of the first path signal of the kth user is calculated, wherein h isk,l(i) Is the channel state matrix Hl(i) Column k of (1) <math> <mrow> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> <mo>;</mo> </mrow> </math>
b. Multiplying and adding the two formulas respectively to obtain <math> <mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>;</mo> </mrow> </math>
c. Using the channel state matrix Hl(i) Then, the module-taking calculation is carried out, <math> <mrow> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> </mrow> </math> <math> <mrow> <mi>&mu;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </math>
d. final step of utilizationb.c. calculating to obtain likelihood ratio lambda1[bk(i)]In the formula, Re is the operation of the real part, <math> <mrow> <msub> <mi>&lambda;</mi> <mn>1</mn> </msub> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>=</mo> <mfrac> <mrow> <mn>2</mn> <mi>Re</mi> <mo>{</mo> <msub> <mi>&mu;</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>}</mo> </mrow> <mrow> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <mo>[</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mo>]</mo> </mrow> </mfrac> <mo>.</mo> </mrow> </math>
the sigma is background noise variance and is estimated by adopting a traditional mean variance method; the channel state matrix Hl(i) Is estimated by a conventional channel estimation method under the condition that the channel impulse responses are assumed to be the same in one symbol i period.
The σ is the background noise variance and can be set to a constant including zero.
The simplified iterative soft interference cancellation method of the present invention is substantially different from the iterative method of reference 6, which is specifically shown in the following:
the method of the invention adopts the output of the Rake receiver as the input of the first iteration;
the method of the present invention may be applied to time-varying channels, rather than only time-invariant channels;
the method of the invention processes each path signal of the multi-path signal, thus adopting different interference offset methods and different external information (extrinsic information) formulas;
from an implementation complexity point of view, the inventive method has only a small increase compared to the conventional PIC method.
Drawings
Fig. 1 is a schematic diagram of a multi-user signal transmission process in a cdma system.
FIG. 2 is a block diagram of the flow of an iterative soft-input-soft-output (SISO) method without joint coding according to the present invention.
FIG. 3 is a block diagram of the iterative soft-in-soft-out (SISO) method for joint channel decoding according to the present invention.
Fig. 4 is a schematic diagram of the encoding flow during transmission.
Fig. 5 is a graph comparing signal-to-noise ratio (SNR) and Bit Error Rate (BER) performance of a hybrid iterative receiving method using RAKE reception and multi-user detection according to the present invention without channel coding.
Fig. 6 is a graph comparing the number of users and the Bit Error Rate (BER) performance using RAKE reception and the multi-user detection hybrid iterative reception method of the present invention without channel coding.
Fig. 7 is a comparison graph of signal-to-noise ratio (SNR) and Bit Error Rate (BER) performance of the multi-user detection hybrid iterative receiving method when joint channel coding is adopted.
Detailed Description
The technical scheme of the invention is further explained by the embodiment and the attached drawings.
Referring to fig. 1, a signal transmission process of a cdma system is illustrated. User bit signals b for K users1,b2,...bKAre respectively pairedThe signals of 0 and 1 are converted into modulated signals after Symbol mapping, and then are correspondingly sent into Spreading modules (Spreading)4 and 5. 6 to become spread signals, the spread signals of K users are added by an adder and then sent, and the signal of the sent signal reaching a receiving end 8 through a Fading Channel 7(Fading Channel) is r (t).
The present invention relates to the technical field of Code Division Multiple Access (CDMA) systems, and when a user signal is transmitted, a symbol mapping module is required to convert '0' and '1' signals into modulated signals. The modulation mode can be various, for example, when BPSK (binary phase shift keying) modulation is adopted, 0 is mapped to-1, and 1 is mapped to + 1; and then the signal is processed by a spread spectrum module to become a spread spectrum signal. Assuming that the spreading factor is N, the signal of the first 1 bit after spreading becomes a spreading waveform of N chips after spreading.
The K user in the K users is represented by a mathematical formula [ iT, i (T +1)]The signals sent in the time period are: <math> <mrow> <munder> <mi>&Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <mi>N</mi> <mo>-</mo> <mn>1</mn> </mrow> </munder> <msub> <mi>A</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>c</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mi>&psi;</mi> <mrow> <mo>(</mo> <mi>t</mi> <mo>-</mo> <mi>iT</mi> <mo>-</mo> <mi>j</mi> <msub> <mi>T</mi> <mi>c</mi> </msub> <mo>)</mo> </mrow> <mo>.</mo> </mrow> </math>
wherein A isk(i) Is the energy factor of the kth user, indicating the difference in user energy, bk(i) Is the modulated bit transmitted by the kth user at time i, e.g., +1 or-1, c in the case of BPSK modulationk(j) Is a spreading code sequence, j 0.., N-1, ψ (t-iT-jT)c) Is a normalized chip waveform, where TcIs the time length of one chip, T is the time length of a symbol, TcT/N, where i, j denote the jth chip of the ith symbol. Let sk(t)=∑j=(1,...,N-1Ck(j)ψ(t-jTc) It is the waveform used to modulate the k user's bit. In the spreading modules 4, 5.. 6 of each user, spreading is performed with different spreading codes and then added for transmission over the fading channel 7.
Each user signal is typically channel coded (41) and interleaved (42) before transmission, the flow of which is shown in fig. 4; when the multi-user detection method of the receiver does not consider and channel decoding iterates each other, then the channel coding may not be considered. Thus two methods will be generated for the solution of the invention: one is an iterative receiving method not combined with channel decoding, the flow is as shown in fig. 2; another is an iterative receiving method combined with channel decoding, the flow of which is shown in fig. 3.
Referring to fig. 2, the signal model of the signal received by RAKE receiver 20 is r (i). In the illustration of fig. 1, the signal of the k-th user passes through a fading channel, and the signal is changed in two ways: one is influenced by multipath effect, and L waveforms are generated by one waveform; the other is that the waveform itself is distorted, so that the waveform of the jth chip of the ith bit becomes a superposition of a plurality of waveforms after passing through the channel, which can be expressed as: <math> <mrow> <munder> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <mi>L</mi> </mrow> </munder> <msub> <mi>g</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mi>&psi;</mi> <mrow> <mo>(</mo> <mi>t</mi> <mo>-</mo> <mi>iT</mi> <mo>-</mo> <mi>j</mi> <msub> <mi>T</mi> <mi>c</mi> </msub> <mo>-</mo> <msub> <mi>&tau;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </math>
wherein g isk,l(t) is a complex number representing the impulse response (waveform distortion) of the time-varying channel, τk,lIndicating a delay effect, the received signal for user k is: <math> <mrow> <msub> <mi>y</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>=</mo> <munder> <mi>&Sigma;</mi> <mi>i</mi> </munder> <msub> <mi>A</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <munder> <mi>&Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <mi>N</mi> <mo>-</mo> <mn>1</mn> </mrow> </munder> <msub> <mi>c</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <munder> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <mi>L</mi> </mrow> </munder> <msub> <mi>g</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mi>&psi;</mi> <mrow> <mo>(</mo> <mi>t</mi> <mo>-</mo> <mi>iT</mi> <mo>-</mo> <mi>j</mi> <msub> <mi>T</mi> <mi>c</mi> </msub> <mo>-</mo> <msub> <mi>&tau;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </math>
thus, the signal of user k at the receiver side is:
r(t)=∑kyk(t)+σn(t)
where n (t) is the standard gaussian noise with mean zero and variance l, and σ represents the variance of the background noise.
In fig. 2, the input to the RAKE receiver should be the discrete form of the received signal, i.e., r (i), and how to obtain r (i) from r (t) is described below. Firstly, the channel impulse response is processed with chip-level matching filtering, the filtering function is psi (t), then the signal impulse response of the ith path of the kth user is processedAfter the chip-level matching filtering, the value is { fk,l(m), expressed by the formula:
∫gk,l(t)ψ(t-iT-jTck,l)ψ(t-mTc)dt
only if t is within a certain range, the above formula is not zero.
Since the spreading code values are different for different chips, the chip-level matched filter output for each chip waveform, considering the spreading code, is:
{hk,l(m)}=Ak{ck(m)}·{fk,l(m)},l=1,2,...,L
the channel states may be organized in a matrix form, i.e., a channel state matrix Hl(i):
Figure A0112049500111
This matrix, which is generally not accurately obtained, can be estimated by conventional channel estimation methods, for example, WMSA channel estimation methods.
Using the channel state matrix Hl(i) We can represent the received signal r (t) as the following discrete form r (i).
After all signals of the l path are matched and filtered at a chip level, the signals are: <math> <mrow> <msub> <mi>r</mi> <mrow> <mi>n</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <msubsup> <mo>&Integral;</mo> <mrow> <mi>iT</mi> <mo>+</mo> <mi>n</mi> <msub> <mi>T</mi> <mi>c</mi> </msub> </mrow> <mrow> <mi>iT</mi> <mo>+</mo> <mrow> <mo>(</mo> <mi>n</mi> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <msub> <mi>T</mi> <mi>c</mi> </msub> </mrow> </msubsup> <msub> <mi>r</mi> <mi>l</mi> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mi>&psi;</mi> <mrow> <mo>(</mo> <mi>t</mi> <mo>-</mo> <mi>iT</mi> <mo>-</mo> <mi>n</mi> <msub> <mi>T</mi> <mi>c</mi> </msub> <mo>)</mo> </mrow> <mi>dt</mi> <mo>,</mo> <mn>0</mn> <mo>&le;</mo> <mi>n</mi> <mo>&lt;</mo> <mi>N</mi> <mo>.</mo> </mrow> </math>
where N (t) is the sum of the signals of the l-th path of all users, the signal of the l-th path in one symbol period has N chips, and can be expressed in a vector form: <math> <mrow> <msub> <mi>r</mi> <mi>l</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mover> <mo>=</mo> <mi>&Delta;</mi> </mover> <mo>[</mo> <msub> <mi>r</mi> <mrow> <mn>0</mn> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>,</mo> <msub> <mi>r</mi> <mrow> <mn>1</mn> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <msub> <mi>r</mi> <mrow> <mi>N</mi> <mo>-</mo> <mn>1</mn> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mo>]</mo> <mi>T</mi> </msup> </mrow> </math>
depending on the transmitted signal and the channel through which it has passed, the received signal for any user can be represented as the product of the chip-level channel matrix and the transmitted signal for that user plus background noise, which is expressed as:
rl(i)=Hl(i)b(i)+σnl(i),l=1,2,...,L.
the result of the chip-level matched filtering of the user signal received at the receiver is: <math> <mrow> <mi>r</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>H</mi> <mi>l</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mi>b</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>+</mo> <mi>n</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mover> <mo>=</mo> <mi>&Delta;</mi> </mover> <mi>H</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mi>b</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>+</mo> <mi>n</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>.</mo> </mrow> </math>
the process flow of the iterative soft input soft output (iterative siso) method without combining with coding is described below in conjunction with fig. 2.
In addition to the original RAKE receiving part 20, the receiver also adds soft input and soft output modules 211, 212, etc. 21K for K users, and transform modules 221, 222, etc. 22K connected between the input and output terminals of each soft input and soft output module 211, 212, etc. 21K, the discretized received signal r (i) is input to the RAKE receiving part 20 and is also input to the first input terminals of each soft input and soft output module 211, 212, etc. 21K at the same time, K user signals output by the RAKE receiving part 20 are input to the second input terminals of each soft input and soft output module 211, 212, etc. 21K, the transformed signals fed back by K transform modules 221, 222, etc. 22K are input to the third input terminals of each soft input and soft output module 211, 212, etc. 21K, and the K input and soft output modules 211, 212, 21K output Extrinsic Information (Extrinsic Information) are fed back and input to the corresponding K transform modules 221 222. .., 22K, the Information bits are outputted by K soft input/soft output modules 211, 212, 21K.
The RAKE receiving section 20 performs code matching filtering using the spreading codes of the users to obtain the signal r of the l path of the k user for the i symbolk,l(i) Using the obtained channel estimate h for the ith symbolk,l(i) For Rake combining, the channel estimation can be obtained by using a common channel estimation method, such as a WMSA method.
The following steps are completed by the soft input and soft output module and the conversion module. The length of a received signal r (i) after chip-level matching filtering is given as N, the iteration times M and the iteration time parameter are given as N, N starts from 1, the increment is 1, and the iteration is finished until N is M.
Step 1, estimating a channel state matrix H by a channel estimation methodl(i)。
And step 2, starting from n-1, performing symbol decision on the result after Rake combining (the result after Rake combining is performed only under the condition that n-1), and obtaining a symbol decision result of the kth user, the ith symbol, the l-th path received signal and channel estimation: <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>sgn</mi> <mo>(</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msubsup> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> <mo>*</mo> </msubsup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>)</mo> <mo>.</mo> </mrow> </math>
where sgn represents the sign (+1 or-1) of the numerical value.
If n is 2, 3, … (i.e., in the case where n > 1), the following operation is performed: <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>tanh</mi> <mrow> <mo>(</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <msub> <mi>&lambda;</mi> <mn>1</mn> </msub> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>)</mo> </mrow> </mrow> </math>
this transformation is the function performed by the transformation module in fig. 2 (i.e. when n is not equal to 1, the SISO module processes the transformation result of the transformation module). Tan in the formula is taken as tangent (tan): tanh ( x ) = e x - e - x e x + e - x therefore, for step 2, when n is 1, the combined result output from the Rake part 20 is directly input to the SISO block for processing, and when n > 1, the result λ output to the SISO block is output1[bk(i)]Is transformed to obtain
Figure A0112049500133
And then input to the SISO module.
Step 3, comprising steps a and b;
step a, carrying out parallel interference cancellation, removing non-l-path signals of all K users and removing l-path signals of other users (K-K) except the K-th user, namely only retaining the l-path signal of the K-th user, <math> <mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>r</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>la</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mi>la</mi> <mo>&NotEqual;</mo> <mi>l</mi> </mrow> <mi>L</mi> </munderover> <msub> <mi>H</mi> <mi>la</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mover> <mi>b</mi> <mo>~</mo> </mover> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>H</mi> <mi>l</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </math>
wherein, b ~ ( i ) = [ b ~ 1 ( i ) , b ~ 2 ( i ) , . . . , b ~ K ( i ) ] , indicating that the k-th component is set to zero
Step b, outputting the likelihood ratio value,
firstly, calculating the weighted value of the first path signal of the kth user, <math> <mrow> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </mrow> </math>
in the formula hk,l(i) (bold) is one column (kth column) in the aforementioned channel state matrix.
Multiplying and adding the formulas (1) and (2) respectively, <math> <mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </mrow> </math>
using the channel state matrix Hl(i) Then, the module-taking calculation is carried out, <math> <mrow> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4</mn> <mo>)</mo> </mrow> </mrow> </math> <math> <mrow> <mi>&mu;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </mrow> </math>
finally, the three formulas (3), (4) and (5) are used to obtain the following formula, wherein Re is the operation of the real part: <math> <mrow> <msub> <mi>&lambda;</mi> <mn>1</mn> </msub> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>=</mo> <mfrac> <mrow> <mn>2</mn> <mi>Re</mi> <mo>{</mo> <msub> <mi>&mu;</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>}</mo> </mrow> <mrow> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <mo>[</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mo>]</mo> </mrow> </mfrac> </mrow> </math>
step 4, increasing n by 1, repeating the steps 1 to 3, stopping the iterative process until n equals M, and then outputting λ1[bk(i)]In step 1, which is repeated at this time, the channel state matrix H is simply re-estimated because n is no longer 1l(i)。
Referring to fig. 3, an iterative SISO method is shown in conjunction with decoding. The difference from the flow shown in fig. 2 is that: a de-interleaving module 33, a SISO decoding module 34 and an interleaving module 35 are added between each SISO module 31 and the corresponding transformation module 32, the interleaving module 35 outputs the extrinsic information and feeds the information back to the transformation module 32, and the SISO decoding module 34 outputs information bits. The operation of the SISO block 31 and the transform block 32 is the same as the iterative SISO method shown in fig. 2 without combination with decoding.
Still using the spread codes of users to make code matching filtering by RAKE receiving portion, and for ith symbol obtaining the signal r of ith path of kth userk,l(i) Using the obtained channel estimate h for the ith symbolk,l(i) For Rake combining, the channel estimation can be obtained by using a common channel estimation method, such as a WMSA method.
The following steps are completed by a soft input and output module, a de-interleaving module, a SISO decoding module, an interleaving module and a transformation module. The length of a received signal r (i) after chip-level matching filtering is given as N, the iteration times are given as M, an iteration time parameter is set as N, N starts from 1, increment is set as 1, and the iteration is finished until N is M.
Step 1: estimation of a channel state matrix H by a channel estimation methodl(i)。
Step 2: and (3) starting from n-1, performing symbol judgment on the result after RAKE combination (only in the case that n-1, performing symbol judgment on the result after RAKE combination to obtain a symbol judgment result of the kth user, the ith symbol, the ith path received signal and channel estimation: <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>sgn</mi> <mo>(</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msubsup> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> <mo>*</mo> </msubsup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> </math>
where sgn represents the sign (+1 or-1) of the numerical value.
If n is 2, 3. (i.e., if n > 1), the following operation is performed <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>tanh</mi> <mrow> <mo>(</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <msubsup> <mi>&lambda;</mi> <mn>2</mn> <mi>p</mi> </msubsup> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>)</mo> </mrow> </mrow> </math>
This transformation is the function performed by the transformation module 32 in fig. 3 (i.e. when n is not equal to 1, the SISO module processes the transformation result of the transformation module. tanh ( x ) = e x - e - x e x + e - x
Therefore, for step 2, when n is 1, the combination result of Rake output is directly input to SISO block 31 for processing, and when n > 1, the result is output to SISO block 31
Figure A0112049500153
[bk(i)](this value is different from the embodiment shown in FIG. 2) by conversionAnd then fed back to the SISO block 31.
And step 3, comprising the following steps a and b:
step a, carrying out parallel interference cancellation, removing non-l-path signals of all K users and removing l-path signals of other users except the K-th user, namely only retaining the l-path signal of the K-th user, <math> <mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>r</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>la</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mi>la</mi> <mo>&NotEqual;</mo> <mi>l</mi> </mrow> <mi>L</mi> </munderover> <msub> <mi>H</mi> <mi>la</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mover> <mi>b</mi> <mo>~</mo> </mover> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>H</mi> <mi>l</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </mrow> </math>
wherein, b ~ ( i ) = [ b ~ 1 ( i ) , b ~ 2 ( i ) , . . . , b ~ K ( i ) ] ,
Figure A0112049500157
indicating that the k-th component is set to zero
Figure A0112049500158
Step b, calculating likelihood ratio lambda1[bk(i)]:
Firstly, calculating a weighted value of the ith path signal of the kth user: <math> <mrow> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>22</mn> <mo>)</mo> </mrow> </mrow> </math>
in the formula hk,l(i) (shown in bold) is one column (kth column) in the aforementioned channel state matrix.
Therefore, by multiplying and adding the respective expressions (11) and (22), it is possible to calculate: <math> <mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>33</mn> <mo>)</mo> </mrow> </mrow> </math>
using the channel state matrix Hl(i) And then performing modulus calculation: <math> <mrow> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>44</mn> <mo>)</mo> </mrow> </mrow> </math> <math> <mrow> <mi>&mu;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>55</mn> <mo>)</mo> </mrow> </mrow> </math>
finally, the following formula is obtained by using the three formulas (33), (44) and (55), wherein Re is an actual part: <math> <mrow> <msub> <mi>&lambda;</mi> <mn>1</mn> </msub> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>=</mo> <mfrac> <mrow> <mn>2</mn> <mi>Re</mi> <mo>{</mo> <msub> <mi>&mu;</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>}</mo> </mrow> <mrow> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <mo>[</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mo>]</mo> </mrow> </mfrac> </mrow> </math>
step 4, firstly, using soft output channel decoding from lambda1[bk(i)]Computing
Figure A0112049500162
[bk(i)]Then, n is increased by 1, and the above steps 1 to 3 are repeatedly executed until n reaches the preset iteration value M, and the decoding module 34 outputs information bits (decided bits). To be explainedIn step 1, which is repeated at this time, the channel state matrix H is only re-estimated since n is no longer 1l(i)。
The channel decoding output value of the soft output is the maximum likelihood ratio, and is the same as a general soft input soft output decoder, such as Turbo code SOVA decoding.
Figure A0112049500163
[bk(i)]By subtracting the information lambda of the soft-decoded input from the output of the soft-output decoder1[bk(i)]The latter likelihood ratio, i.e., the a priori information added by channel decoding.
According to the flow of fig. 4, since channel decoding and interleaving are performed (completed by the channel coding module 41 and the interleaving module 42) when the user signal is sent, during decoding and feedback in fig. 3, the inverse (de) interleaving module 33 needs to perform inverse (de) interleaving (de interleaver) and the interleaving module 35 needs to perform interleaving (interleaver) respectively.
In both cases, fig. 2 and fig. 3, the calculations require some estimators, e.g., σ, Hl(i) The estimation method comprises the following steps:
the background noise variance σ can be estimated by adopting a common mean variance method; it may also simply be set to a constant, e.g. zero.
Channel state matrix Hl(i) Estimation of (2): for simple calculation, the channel estimation can be simplified greatly by assuming that the channel impulse responses are the same in one symbol period. This can be estimated using common channel estimation algorithms.
Referring to fig. 5, a graph comparing signal-to-noise ratio (SNR) and Bit Error Rate (BER) performance of RAKE reception (upper curve in the figure) with the multi-user detection hybrid iterative reception (first case not combined with coding) method (lower curve in the figure) of the present invention is shown, where the former has a higher Bit Error Rate (BER) than the latter under the same signal-to-noise ratio (SNR).
Referring to fig. 6, a graph comparing the user number and the Bit Error Rate (BER) performance of the method (the lower curve in the figure) of the present invention (the first case not combined with coding) using RAKE reception (the upper curve in the figure) and multi-user detection hybrid iterative reception (the first case not combined with coding) without channel coding is shown, where the former has a higher Bit Error Rate (BER) than the latter for the same number of Users (Users).
Referring to fig. 7, a graph of signal-to-noise ratio (SNR) and Bit Error Rate (BER) performance for a multi-user detection hybrid iterative receive method (the second case combined with coding) using the present invention for joint channel coding is shown, which has better performance than the lower curve in fig. 5.
The method of the invention adopts the output of a Rake receiver as the input of a first iteration (n is 1);
the method of the present invention can be applied to a time-varying channel, whereas the method of document 6 can only be applied to a time-invariant channel;
the method of the invention processes each path signal of the multi-path signal, thus adopting different interference offset methods and different external information (extrinsic information) formulas;
the complexity of the inventive method is only marginally increased compared to conventional PICs.

Claims (10)

1. A method for multi-user detection in a wireless receiver, comprising the steps of:
A. setting a Soft Input Soft Output (SISO) module and a transformation module corresponding to each user;
B. setting the iteration times M and the iteration time parameters n and M, n to be positive integers;
C. setting n equal to 1, and making symbol decision on the combined output result signal of RAKE receiver by Soft Input and Soft Output (SISO) module;
D. according to the symbol decision result, carrying out parallel interference cancellation on the input discretized received signal and outputting a likelihood ratio;
E. let n be increased by 1, the transform module of the Soft Input Soft Output (SISO) module transforms the symbol decision result output by the Soft Input Soft Output (SISO) module and feeds back the result to the Soft Input Soft Output (SISO) module, and then step D, E is executed until n is M.
2. The method of claim 1, wherein the method comprises: and step A, setting K Soft Input Soft Output (SISO) modules and K transformation modules corresponding to K users, wherein each transformation module is arranged between the feedback input end and the external information output end of the corresponding Soft Input Soft Output (SISO) module and is used for processing the iterative soft input soft output of the non-joint channel coding and decoding, and the Soft Input Soft Output (SISO) module outputs the likelihood ratio.
3. The method of claim 1, wherein the method comprises: and step A, setting K Soft Input Soft Output (SISO) modules, K de-interleaving modules, K soft input soft output decoding modules, K interleaving modules and K transformation modules corresponding to K users, wherein each transformation module is arranged between the feedback input end of the corresponding Soft Input Soft Output (SISO) module and the external assigned information output end of the corresponding interleaving module and is used for processing the iterative soft input soft output of the joint channel coding and decoding, and the soft input soft output decoding module outputs the likelihood ratio.
4. The method of claim 1, wherein the method comprises: said step C is based on the following formula to perform the symbol operation of taking value on the result after RAKE combination, wherein r isk,l(i) Is the L path signal h of the L path signal of the K user in the K users obtained by aiming at the ith symbolk,l(i) Is a channel estimation value of the ith symbol, <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>sgn</mi> <mo>(</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msubsup> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> <mo>*</mo> </msubsup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>)</mo> <mo>.</mo> </mrow> </math>
5. a method for multi-user detection in a radio receiver as claimed in claim 1 or 2, characterized in that: the step E is to determine the symbol decision result lambda output by the Soft Input Soft Output (SISO) module according to the following formula1[bk(i)]The transformation is carried out, and the transformation is carried out, <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>tanh</mi> <mrow> <mo>(</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <msub> <mi>&lambda;</mi> <mn>1</mn> </msub> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>)</mo> </mrow> <mo>.</mo> </mrow> </math>
6. a method for multi-user detection in a radio receiver as claimed in claim 1 or 3, characterized in that: the step E is to determine the symbol decision result lambda output by the Soft Input Soft Output (SISO) module according to the following formulaP 2[bk(i)]The transformation is carried out, and the transformation is carried out, <math> <mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>tanh</mi> <mrow> <mo>(</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <msubsup> <mi>&lambda;</mi> <mn>2</mn> <mi>p</mi> </msubsup> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>)</mo> </mrow> <mo>.</mo> </mrow> </math>
7. the method of claim 6, wherein the method further comprises: said lambdaP 2[bk(i)]Is to subtract the soft input information lambda of the soft input soft output decoder from the soft output of the soft input soft output decoder1[bk(i)]The latter likelihood ratio.
8. The method of claim 1, wherein the method comprises:
in the step D, the parallel interference cancellation is performed on the input discretized received signal by removing non-l-path signals of all K users and removing l-path signals of K-K users except the K-th user, that is, only the l-path signal of the K-th user is retained, and the processing formula is as follows: <math> <mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>r</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>la</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mi>la</mi> <mo>&NotEqual;</mo> <mi>l</mi> </mrow> <mi>L</mi> </munderover> <msub> <mi>H</mi> <mi>la</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mover> <mi>b</mi> <mo>~</mo> </mover> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>H</mi> <mi>l</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mover> <mi>b</mi> <mo>~</mo> </mover> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </math>
wherein, b ~ ( i ) = [ b ~ 1 ( i ) , b ~ 2 ( i ) , . . . , b ~ K ( i ) ] , indicating that the k-th component is set to zero
Figure A0112049500037
,Hl(i) Is a channel state matrix;
the step D of outputting the likelihood ratio further includes the following processing steps:
a. first, the weighted value of the first path signal of the kth user is calculated, wherein h isk,l(i) Is the channel state matrix Hl(i) Column k of (1) <math> <mrow> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> <mo>;</mo> </mrow> </math>
b. Multiplying and adding the two formulas respectively to obtain <math> <mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>w</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>r</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>;</mo> </mrow> </math>
c. Using the channel state matrix Hl(i) Then, the module-taking calculation is carried out, <math> <mrow> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> <mrow> <msup> <mi>&sigma;</mi> <mn>2</mn> </msup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>|</mo> <mo>|</mo> </mrow> <mn>2</mn> </msup> </mrow> </mfrac> </mrow> </math> <math> <mrow> <mi>&mu;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </math>
d. finally, the likelihood ratio lambda is calculated by using the three formulas in the step b.c1[bk(i)]In the formula, Re is the operation of the real part, <math> <mrow> <msub> <mi>&lambda;</mi> <mn>1</mn> </msub> <mo>[</mo> <msub> <mi>b</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>]</mo> <mo>=</mo> <mfrac> <mrow> <mn>2</mn> <mi>Re</mi> <mo>{</mo> <msub> <mi>&mu;</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <msub> <mi>z</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>}</mo> </mrow> <mrow> <munderover> <mi>&Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>L</mi> </munderover> <mo>[</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>&mu;</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>l</mi> </mrow> </msub> <msup> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mo>]</mo> </mrow> </mfrac> <mo>.</mo> </mrow> </math>
9. the method of claim 8, wherein the method further comprises: the sigma is background noise variance and is estimated by adopting a traditional mean variance method; the channel state matrix Hl(i) Is estimated by a conventional channel estimation method under the condition that the channel impulse responses are assumed to be the same in one symbol i period.
10. The method of claim 8, wherein the method further comprises: the σ is the background noise variance and can be set to a constant including zero.
CNB011204958A 2001-07-19 2001-07-19 Multi-user test method for radio receiver Expired - Fee Related CN1194478C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB011204958A CN1194478C (en) 2001-07-19 2001-07-19 Multi-user test method for radio receiver

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB011204958A CN1194478C (en) 2001-07-19 2001-07-19 Multi-user test method for radio receiver

Publications (2)

Publication Number Publication Date
CN1398053A true CN1398053A (en) 2003-02-19
CN1194478C CN1194478C (en) 2005-03-23

Family

ID=4664178

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB011204958A Expired - Fee Related CN1194478C (en) 2001-07-19 2001-07-19 Multi-user test method for radio receiver

Country Status (1)

Country Link
CN (1) CN1194478C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7787522B2 (en) 2003-04-11 2010-08-31 Telefonaktiebolaget Lm Ericsson (Publ) Joint multi-code detectors in CDMA communications system
CN114389666A (en) * 2021-12-06 2022-04-22 哲库科技(北京)有限公司 Base band chip, receiver and signal detection method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7787522B2 (en) 2003-04-11 2010-08-31 Telefonaktiebolaget Lm Ericsson (Publ) Joint multi-code detectors in CDMA communications system
CN1771671B (en) * 2003-04-11 2012-06-13 艾利森电话股份有限公司 Joint detection method and system in CDMA communications system
CN114389666A (en) * 2021-12-06 2022-04-22 哲库科技(北京)有限公司 Base band chip, receiver and signal detection method

Also Published As

Publication number Publication date
CN1194478C (en) 2005-03-23

Similar Documents

Publication Publication Date Title
Liu et al. Analysis and optimization of CDMA systems with chip-level interleavers
Ping et al. Approaching the capacity of multiple access channels using interleaved low-rate codes
EP1264456B1 (en) Method and apparatus for combined soft-decision based interference cancellation and decoding
CN1306713C (en) Error correction in CDMA mobile communication system using turbo codes
CN100527657C (en) Iterative decoding with likelihood weighting
CN1327306A (en) Toubo decoding method with error information recording and feedback
CN1349699A (en) Estimation method, receiver and decoder, of channel conditions in wireless communications
CN1478330A (en) Multiuser Detector for Direct Sequence-CDMA Channels
CN106453185A (en) IDMA system improvement method based on CCSK modulation
CN1771671A (en) Joint multi-code detectors in CDMA communications system
CN1197255C (en) Communication device and communication method
CN1640047A (en) Apparatus and method for determining combiner weights and log-likelihood ratios for symbols transmitted in a wireless communication system
JP5695647B2 (en) Efficient soft value generation for coded bits in a turbo decoder
WO2017206188A1 (en) Ftn-based communication method and relevant apparatus
CN1227820C (en) Optimized Enhanced Decoder
CN1337095A (en) Method and device for decoding convolution codes
CN1674482A (en) Method and apparatus for detecting normalized iterative soft interference cancelling signal
CN1194478C (en) Multi-user test method for radio receiver
CN1153400C (en) Method for estimating bit error rate in radio receiver and corresponding radio receiver
CN1145298C (en) A Simplified Multi-User Detection Method for Wireless Receivers
CN1423863A (en) Interference cancellation system in a CDMA receiver and method for cancelling interference
CN100344070C (en) Turbo decoder and turbo decoder method
CN1773867A (en) Method for decoding Turbo code
CN1729667A (en) Channel turbo-estimation receiver with optimized conversion
CN1650291A (en) Filter structure for iterative signal processing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050323

Termination date: 20170719