Skip to main content

Scheduling schemes with adaptive blind detection for code reuse in multiuser MIMO systems

Abstract

To improve spectrum efficiency in wireless multiple‐input, multiple‐output (MIMO) systems, it is essential to mitigate channel interference. Opportunistic scheduling of multiusers and interference cancellation, such as adaptive multiuser detection, are two commonly used techniques. In this paper, we study the performance improvement of using jointly these techniques to enable the use of the same set of spreading codes to transmit two data streams in closed‐loop multiuser MIMO systems. We show that with the proposed scheduling schemes, the performance of an adaptive blind receiver is not degraded when the scheduled users share the same spreading code.

1 Introduction

The main obstacle limiting the performance of multiuser multiple‐input, multiple‐output (MU‐MIMO) system and its spectral efficiency is the interference caused by MU‐MIMO transmissions that share the same channel [1, 2]. To overcome interference, several approaches are currently being implemented, ranging from transmitter adaptation schemes to interference cancellation [3]‐[5]. However, increasing the spectral efficiency is a challenging task when a multiuser interference scenery level is established. Convenient user selection has the potential to efficiently deal with this multiuser interference channel.

An efficient spatial scheduling algorithm is essential to realize the promised benefits of MU‐MIMO. So far, many papers have reported practical spatial scheduling schemes to mitigate the residual interference (signal of co‐scheduled user), e.g. single antenna at terminals has been widely studied in the last decade [6]‐[8]. In [9], the authors proposed a practical approach for selecting users with orthogonal channel weight vector (CWV). However, that scheme is highly dependent on the availability of a completed CWV at the transmitter side (CWVT) [10]. For practical reasons, a completed CWVT is far from being realizable, and therefore, strategies based on limited or quantized CWVT have been considered at the expense of degrading received signal quality [10]. However, this performance degradation can be overcome at the receiver side if the detection algorithm, instead of ignoring the residual interference or assuming it to be Gaussian, exploits its structure using interference‐aware receivers.

Linear multiuser techniques have been widely analyzed in the literature [11, 12]. On MIMO channels, the use of low complexity receivers that improve the performance of the conventional scheme (that treats interference as white Gaussian noise) is of fundamental importance [13, 14]. In particular, the adaptive blind receiver (ABR) [15], a blind adaptive version of the minimum‐mean‐square‐error (MMSE) detector, is specially attractive for the downlink MIMO system since, in a dynamic environment, it is very difficult for a mobile user to obtain accurate information on other active users in the channel, such as their spreading code [15]. It is well known that the ABR is based on the minimum output energy (MOE) criterion which searches the component of the desired signal that lies in a subspace orthogonal to the subspace spanned by the interference and noise simultaneously [12]. With this in mind, a careful selection of co‐scheduled users that lie in orthogonal subspaces can reduce the interference level and improve the spectral efficiency by enabling spreading code reuse.

The contribution of this work is to show that the combination of subspace‐aware user selection and the well‐known MOE receiver algorithm reaches an effective data user separation, even when the users share the same spreading code. The following notations are used in the paper: ,,R,C, ( · ) , ( · ) T , ( · ) H , · , and ·, denoting real part, imaginary part, real number, complex number, complex conjugate, transpose, hermitian, correlation, and norm, respectively. Scalars are written in lowercase, vectors in bold lowercase, and matrices with bold uppercase letters. The paper is organized as follows: the system model is presented in Section 2, and the adaptive blind receiver is analyzed in Section 3, followed by scheduling schemes presented in Section 4. Simulation results are presented in Section 5, followed by paper conclusions.

2 System model

The system model for the downlink of a wireless communication system is illustrated in Figure 1. The system consists of a single base station (BS) with two transmit (Tx) antennas j=1, 2 and K active user equipments (UEs) with single‐element antennas.

Figure 1
figure 1

MIMO system with K users.

In case of flat fading and rich scattering, the channel gain from a j th Tx antenna to a k th UE is described by a zero‐mean circularly symmetric complex Gaussian random variable (RV), g j k , for j=1,2 and k=1,...,K. For simplicity, we assume that all UEs are spatially homogeneously distributed and experience independent fading. We also assume that each UE has a low‐rate, reliable, and delay‐free feedback channel to the BS. For convenience, we will assume that the user of interest is k=1. The signal received by user 1, in a single symbol interval [0, T], can be written as

r 1 ( t ) = k = 1 K ( g 1 T · w k ) b k s k ( t ) + σ n 1 ( t ) ,
(1)

where g 1=[g 11 g 21]T is the channel gain vector from the BS to the desired user with unit variance entries. w k =[w 1k w 2k ]T is the Tx channel weight vector that maximizes the received energy for the desired user. b k {+1,−1} represents the identical and independent distributed users data stream with zero mean and unit variance. s k (t) is the unit energy spreading code of the k th user. n 1(t) is the additive white Gaussian noise (AWGN) component with unit variance, and σ is a scalar factor that affects the variance level of the AWGN component.

Let {ψ 1(t),...,ψ L (t)} be a set of L orthonormal signals defined on i th [i T, i T+T] time interval. The received signal vector r 1 C L × 1 of the desired user is the L‐dimensional representation of r 1(t) on the basis {ψ 1(t),...,ψ L (t)}, that is, the l component of the column vector r 1 is

r 1 l [i]= iT iT + T r 1 (t) ψ l (t)dtl=1,,L.
(2)

Furthermore, we define the components of the spreading code vector s k R L × 1 as

s kl [i]= iT iT + T s k (t) ψ l (t)dtl=1,,L
(3)

and the component of the L‐dimensional Gaussian vector n 1 C L × 1 as

n 1 l [i]= iT iT + T n 1 (t) ψ l (t)dtl=1,,L.
(4)

For convenience, the received signal (Equation 2) is expressed in vector form:

r 1 [ i ] = h 11 b 1 [ i ] s 1 + , , + h 1 K b K [ i ] s K + σ n 1 [ i ]
(5)
r 1 [ i ] = S H b [ i ] + σ n 1 [ i ] ,
(6)

where

S = def s 1 s K ,
(7)
h 11 = def ( g 1 T · w 1 ) ,
(8)
h 1 K = def ( g 1 T · w K ) ,
(9)
H = def diag ( h 11 , h 1 K ) ,
(10)
b [ i ] = def b 1 [ i ] b K [ i ] T .
(11)

The autocorrelation matrix of the received signal r 1[i] is given by

R rr =E r 1 [ i ] r 1 H [ i ] = SH SH H + σ 2 I,
(12)
R rr =SA S H + σ 2 I,
(13)

where A=H H H=diag(|h 11|2,...,|h 1K |2) with a k k =|h 1k |2 k=1,...K, and I is the L×L identity matrix. The system model adopted is illustrated in Figure 2.

Figure 2
figure 2

System model scheme.

3 Adaptive blind receiver

The adaptive MOE detector was first proposed by Honig et al. [15] and is blind to some extent because a training sequence is not required. It is therefore commonly known as the adaptive blind receiver. The adaptive MOE algorithm is implemented by a transversal filter which converges to the MMSE detector to within a scaling factor [11]. Figure 3 shows the implementation structure. A key property of every linear multiuser receiver is that the impulse response can be decomposed as a sum of two orthogonal components. One of those components is equal to the spreading code of the desired user which is assumed to be known and fixed throughout this section, that is, c[i]=s 1+x 1[i], where x 1 H s 1 =0. The cost function is the variance of the filter output, known as output energy (OE), and is minimized over the adaptive component x 1[i] subject to the constraint 〈c[i], s 1〉=1 [15]. The OE is given by [15]

ξ[i]= c H [ i ] r 1 [ i ] 2 ,
(14)
Figure 3
figure 3

Blind adaptive receiver structure.

where i is the time index interval, and the MOE may be written as

ξ min =minE c [ i ] H r 1 [ i ] 2 s.t. c [ i ] , s 1 =1.
(15)

Taking into consideration that the receiver knows the actual weighted channel gain (h 11), the decision on b 1 is given by

b ̂ 1 =sgn h 11 c , r 1 .
(16)

Applying the gradient descent algorithm to the cost function (Equation 14), the stochastic gradient adaptation rule is [15]

x 1 i + 1 = x 1 [ i ] μ z [ i ] P s 1 r 1 [ i ] ,
(17)

where P s 1 = I s 1 s 1 H is the matrix that projects vectors, pre‐multiplies it, onto the space orthogonal to s 1, and μ R 1 × 1 is the step‐size. In the work of [16], the authors show that the trajectory of the tap‐weight vector, x 1, depends on the eigenvalues of the equivalent autocorrelation matrix projected on a spreading code subspace orthogonal to the desired user. This subspace approach analysis shows also that the transient behavior of the MOE learning curve just depends on the largest K−1 eigenvalues of the equivalent matrix autocorrelation when the adaptive component is initialized in x 1[0]=0 [17]. Based on this, when two users share the spreading code, they share the same eigenvalue too. Therefore, based only on the spreading code data separation, the tap adaptation algorithm cannot distinguish two users with the same spreading code. In the next section, the error probability analysis of this receiver is presented.

3.1 Probability of error

To analyze the bit error rate of the blind adaptive receiver P 1 b (σ), we can consider K users case. First, we treat the elements of the weighted channel matrix H as a constant value (block‐fading) to derive a first expression. Then, we find the expected value of the error probability in a semi‐analytical way, over the marginal probability density function (PDF) of each element of H.

The probability of error is

P 1 ( σ ) = P b ̂ 1 b 1 = b 1 1 , 1 P b ̂ 1 b 1 | b 1 P b 1 = 1 2 b 1 1 , 1 P b ̂ 1 b 1 | b 1 ,
(18)

with

P b ̂ 1 b 1 | b 1 = 1 2 K 1 j = 1 2 K 1 P b ̂ 1 b 1 | b 1 , ε j ,
(19)

where ε j R ( K 1 ) × 1 belong to a set of 2K−1 vectors that contains all the data combination of the interfering users. Focusing on one term of Equation 19 and taking into account that if b 1=−1 in Equation 16, the filter output is

h 11 r 1 , c = h 11 2 +q+σ c h 11 m 1 ,
(20)

where m 1 is another zero‐mean circularly symmetric complex Gaussian random variable, and

q= h 11 k = 2 K h 1 k ρ k + x 1 , s k ε j (k1),
(21)

represents the multiaccess interference (MAI). Considering Equation 20, one term of Equation 19 is given by

1 2 P h 11 2 + q < σ h 11 c 1 m 1 .
(22)

Proceeding in a similar way with the other terms of Equation 19 and replacing in Equation 18, we have P 1(σ) in Equation 26. Then we must take expectation value over the PDF of h 11 and h 1k in order to get P 1 b (σ). In Equation 26, the phase term h 11 h 11 only affects the phase distribution of the random variable h 1k inside the Q(·) function, whose statistic is uniform over [0, 2π] and thus can be dropped. The expression of P 1 b (σ) can be rewritten as in Equation 27 where the expectation value is taken over each h 1k .

4 Scheduling schemes

From Equation 27 we can observe that error probability is a function of two MAI terms. One of them depends directly on the weighted channel gain of the desired user, and the other is related to the blind adaptive algorithm whose performance is also influenced by the co‐scheduled weighted channel gains. In this section, we present three different schedulers that try to reduce the MAI.

  • Scheduler A. In order to minimize the interference level experienced by the receiver, the first idea is to schedule users with orthogonal weight channel vectors [9]. Based on this, the weighted channel gains of the scheduled users result uncorrelated, that is,

    E ( g 1 T · w 1 ) * ( g 1 T · w 2 ) =0,
    (23)

    where only two users can be used because the number of transmit antennas defines the number of orthogonal users that can be served simultaneously. Equation 23 can be interpreted in a different way, noting that the two scheduled users’ weight channel vectors should be collinear and opposite in phase at the receiver.

  • Scheduler B. This scheduling strategy follows from the observation that the impact of interference on the performance of blind adaptive receiver is through the real term of the argument of Q(·) function. Due to the fact that the blind adaptive algorithm decodes the desired user in a direction orthogonal to interference and noise, we can project some part of the interference in a subspace orthogonal to the desired data by selecting users with proper weight channel vectors that result in a p/2 relative rotation. In the case of K=2, the scheduler selects two users that report orthogonal weight channel vectors in the same fashion as Scheduler A, but instead of pre-filtering the transmit signal with those reported weights, one weight channel vector is rotated by p/2 before using in the pre-filtering matrix. That is to say that if w 1' and w 2 are the orthogonal weights reported by the scheduled users, then a rotation is applied to w 1', yielding

    w 1 = w 1 ' e jp / 2 ,
    (24)

    and then pre‐filtering with w 1 and w 2 is used at BS. The condition imposed by Equation 24 does not change the correlation between them nor the purpose of energy maximization at the receiver side of each user. In the case of K≥2 and an even number of users, the BS can schedule 2N usersdistributed in N groups of two users with orthogonal weight channel vectors, where N represents the available spreading code. The received signal in the time interval for the desired user can be written as

    r 1 = i = 1 K ( g 1 T · w 2 k 1 ) b 2 k 1 + ( g 1 T · w 2 k ) b 2 k s k +σ n 1 ,
    (25)

    with w 2 k H w 2 k 1 =0. With the signal processing at the receiver in mind, the condition imposed by Equation 24 minimizes the interference caused by user 2 because its real component is almost cancelled.

    P 1 ( σ ) = 1 2 K j = 1 2 K 1 Q h 11 σ 2 2 1 + x 1 2 h 11 h 11 q σ 2 2 1 + x 1 2 + Q h 11 σ 2 2 1 + x 1 2 + h 11 h 11 q σ 2 2 1 + x 1 2
    (26)
    P 1 b ( σ ) = 1 2 K 1 j = 1 2 K 1 E Q h 11 + k = 2 K h 11 h 1 k h 11 ρ k + x 1 , s k ε j ( k 1 ) σ 2 2 1 + x 1 2 .
    (27)
  • Scheduler C. This scheduling strategy is based on the observation already done for Scheduler B, but in this case, the scheduler selects the users that report the same weight channel vector, then only a rotation is applied to one of them in order to minimize the interference. For the case of K=2, that is, if w 1' and w 2 are the weights reported by the scheduled users and w 1'=w 2, then a rotation is applied to w 2, yielding

    w 2 = w 2 e jp / 2 .
    (28)

Note that the signal processing at the BS with Schedulers B and C only consists of a relative rotation of the two scheduled users. In this way, these schedulers are projecting the interference data onto a subspace orthogonal to the desired data. For an even number of users, i.e., K=2N, the BS can schedule these K users in N groups of two users using N different spreading codes and selecting the users in each group based on their reported weight channel vectors.

5 Simulation results

In this section, we investigate the system performance under scheduling schemes (23), (24), and (28) using two types of detection: match filtering and adaptive blind interference cancellation. A Gold sequence of length 7 and phase quantized weight channel vectors for high‐speed downlink packet access (HSDPA) mode 1 compatibility were selected for the simulation [18]. According to this, three scenarios are considered:

  • Scenario 1 (Sc-1). Only one group with two users using different spreading codes is active.

  • Scenario 2 (Sc-2). Six groups with two users using the same spreading codes are active.

  • Scenario 3 (Sc-3). Similar to Sc-2 except in one group, the one whose performance is analyzed. In this group of interest, the users do not share the same spreading code.

Figure 4 shows that spreading code reuse leads to a full performance degradation for both detection schemes when Scheduler A (Equation 23) is used. This behavior can be explained taking into account that both interference and desired signals are collinear with this scheduling strategy. In this case, the use of different spreading codes is essential to recover performance degradation, as shown in the curves as solid lines. For comparison, the two‐user scenario is plotted in the figure in order to evaluate the performance degradation with higher multi‐user interference. Figure 5 shows the performance of the ABR and match filter receiver (MF) with Scheduler B, i.e., the one that uses π/2 rotation, in the same three scenarios. This scheduler enables code reuse since the performance of ABR is slightly degraded when the same spreading code is used in the group (ABR performance in Sc‐3 degrades less than 1 dB compared with that in Sc‐2). This ABR behavior is due to the fact that Scheduler B adjusts the data of the scheduled users to arrive with π/2 rotation, so the ABR algorithm can work properly. On the other hand, Scheduler A forces data user 1 and user 2 to be collinear and with opposite phase at the receiver, so the ABR algorithm cannot separate the users. In Sc‐2 also, the performance of MF improves with Scheduler B. On the other hand, the use of Scheduler B in Sc‐3 only slightly helps improve the performance. Figure 6 shows the performance of ABR and MF with Scheduler C. First of all, note that MF performance is almost the same with Sc‐2 and Sc‐3; therefore, code reuse does not degrade the MF performance when Scheduler C is used. Using an ABR in SC‐3, a performance improvement of almost 5 dB with respect to MF is achieved with this scheduler. It is interesting to note that Scheduler C improves the ABR in Sc‐2. This is because the users scheduled in each group are the ones that reported the same weight channel vectors, and therefore, applying a π/2 rotation to one of them, the component of the intra‐group interference, orthogonal to the desired signal, is maximized at the receiver. Figure 7 shows the comparative performance of the ABR with the three types of schedulers in Sc‐2. The performance achieved by Scheduler C with respect to Scheduler B is due to the fact that interference signal lie on subspaces orthogonal to the desired signal, and in this situation, a perfect data separation can be performed by ABR.

Figure 4
figure 4

Blind adaptive receiver performance with Scheduler A.

Figure 5
figure 5

Blind adaptive receiver performance with Scheduler B.

Figure 6
figure 6

Blind adaptive receiver performance with Scheduler C.

Figure 7
figure 7

Blind adaptive receiver comparative performance.

6 Conclusions

We have studied the performance of the adaptive blind MOE receiver in a 2×1 MIMO scenario with practical UE schemes to take advantage of multiuser diversity in a multiple‐antenna broadcasting channel with limited feedback. New scheduling schemes that try to reduce interference projecting the non‐canceled interference in a subspace orthogonal to the desired signal at the receiver is proposed in this paper for closed‐loop MIMO system. The combination of the proposed schedulers and adaptive blind detection enables code reuse, making it possible to achieve higher spectrum efficiency with low complexity receivers. The proposed schedulers were analyzed for the practical case wherein the amount of feedback channel is compatible with mode 1 of the HSDPA technology.

References

  1. Ghaffar R, Knopp R: Interference‐aware receiver structure for multi‐user MIMO and LTE. EURASIP. J. Wireless Commun. Netw 2011, 2011: 1-17.

    Google Scholar 

  2. Andrews J: Interference cancellation for cellular systems: a contemporary overview. Wireless Commun. IEEE 2005, 12(2):19-29. 10.1109/MWC.2005.1421925

    Article  Google Scholar 

  3. Wrulich M, Mehlfuhrer C, Rupp M: Managing the interference structure of MIMO HSDPA: a multi‐user interference aware MMSE receiver with moderate complexity. Wireless Commun. IEEE Trans 2010, 9(4):1472-1482.

    Google Scholar 

  4. Mehlfuhrer C, Wrulich M, Rupp M: Intra‐cell interference aware equalization for TxAA HSDPA. In 3rd International Symposium on Wireless Pervasive Computing. Santorini; 2008:406-409. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=4556239%26isnumber=4556149 10.1109/ISWPC.2008.4556239

    Google Scholar 

  5. Wrulich M, Mehlfuhrer C, Rupp M: Interference aware MMSE equalization for MIMO TxAA. 2008. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=4537480%26isnumber=4537177 10.1109/ISCCSP.2008.4537480

    Chapter  Google Scholar 

  6. Yoo T, Goldsmith A: Optimality of zero‐forcing beamforming with multiuser diversity, vol.1. In IEEE International Conference on Communications. New York: IEEE; 2005:542-546.

    Google Scholar 

  7. Dowhuszko A, Corral‐Briones G, Hamalainen J, Wichman R: On the analysis and design of practical quantization for opportunistic beamforming. In IEEE International Conference on Communications. Beijing; 2008:5133-5139. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=4534000%26isnumber=4533036 10.1109/ICC.2008.964

    Google Scholar 

  8. Dowhuszko A, Corral‐Briones G, Hamalainen J, Wichman R: Achievable sum‐rate analysis of practical multiuser scheduling schemes with limited feedback. In IEEE International Conference on Communications. Glasgow; 2007:4381-4386. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=4289394%26isnumber=4288671 10.1109/ICC.2007.723

    Google Scholar 

  9. Haikola V, Lampinen M, Kuusela V: Practical multiuser beamforming in WCDMA. In Vehicular Technology Conference, 2006. VTC‐2006 Fall. 2006 IEEE 64th.. Montreal; 2006:1-5. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=4109453%26isnumber=4109265 10.1109/VTCF.2006.188

    Google Scholar 

  10. Love D, Heath R, Lau V, Gesbert D, Rao B, Andrews M: An overview of limited feedback in wireless communication systems. Selected Areas Commun. IEEE J 2008, 26(8):1341-1365.

    Article  Google Scholar 

  11. Verdu S: Multiuser detection. Cambridge: Cambridge University Press; 1998.

    Google Scholar 

  12. Honig M: Advances in multiuser detection. New Jersey: Wiley; 2009.

    Book  Google Scholar 

  13. Lupas R, Verdu S: Linear multiuser detectors for synchronous code‐division multiple‐access channels. 1989.

    Google Scholar 

  14. Lupas R, Verdu S: Near‐far resistance of multiuser detectors in asynchronous channels. Commun. IEEE Trans 1990, 38(4):496-508. 10.1109/26.52661

    Article  Google Scholar 

  15. Honig M, Madhow U, Verdu S: Blind adaptive multiuser detection. Inf. Theory IEEE Trans 1995, 41(4):944-960. 10.1109/18.391241

    Article  Google Scholar 

  16. Gong Y, Lim TJ, Farhang‐Boroujeny B: Performance analysis of the LMS blind minimum‐output‐energy CDMA detector. In Proceedings. 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2000. ICASSP ’00, vol.5. Istanbul; 2000:2473,2476-2473,2476. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=860936%26isnumber=18667 10.1109/ICASSP.2000.860936

    Google Scholar 

  17. Gong Y, Farhang-Boroujeny B, Lim TJ: Variable step‐size LMS blind CDMA multiuser detector. In Proceedings. 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001. (ICASSP ’01), vol. 4. Salt Lake City; 2001:2285, 2288-2285, 2288. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=940455%26isnumber=20357 10.1109/ICASSP.2001.940455

    Google Scholar 

  18. 3GPP: Physical Layer Procedures(FDD). (3GPP Technical specification TS 25.214 Ver 7.3, 2006), . Accessed 08 Dec 2008 http://www.3gpp.org/ftp/Specs/html-info/25214.htm (3GPP Technical specification TS 25.214 Ver 7.3, 2006), . Accessed 08 Dec 2008

Download references

Acknowledgements

This study was supported by The National Scientific and Technical Research Council (CONICET) under grant no. 1917/12, ANPCyT under grant PICT2011‐2527, and SeCyT‐UNC.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Horacio A Mendoza.

Additional information

Competing interests

Both authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Mendoza, H.A., Corral‐Briones, G. Scheduling schemes with adaptive blind detection for code reuse in multiuser MIMO systems. EURASIP J. Adv. Signal Process. 2013, 109 (2013). https://doi.org/10.1186/1687-6180-2013-109

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-6180-2013-109

Keywords