Robust blind multiuser detection against signature waveform mismatch based on second-order cone programming

Shuguang Cui, Mikalai Kisialiou, Zhi Quan Luo, Zhi Ding

Research output: Contribution to journalArticlepeer-review

11 Scopus citations

Abstract

Blind signal detection in multiuser code division multiple access (CDMA) system is particularly attractive when only the desired user signature is known to a given receiver. A problem common to several existing blind multiuser CDMA detectors is that the detection performance is very sensitive to the signature waveform mismatch (SWM) which may be caused by channel distortion. In this paper, we consider the design of a blind multiuser CDMA detector that is robust to the SWM. We present a convex formulation for this problem by using the second-order cone (SOC) programming. The resulting SOC problem can be solved efficiently using the recently developed interior point methods. Computer simulations indicate that the performance of our new robust blind multiuser detector is superior to those of many existing methods.

Original languageEnglish (US)
Pages (from-to)1285-1291
Number of pages7
JournalIEEE Transactions on Wireless Communications
Volume4
Issue number4
DOIs
StatePublished - Jul 2005

Bibliographical note

Funding Information:
Manuscript received December 6, 2002; revised September 30, 2003; accepted May 4, 2004. The editor coordinating the review of this paper and approving it for publication is A. Yener. The work of S. Cui, M. Kisialiou, and Z.-Q. Luo was supported by the Natural Sciences and Engineering Research Council of Canada under Grant OPG0090391, and by the Canada Research Chair Program. The work of Z.-Q. Luo was also supported in part by the National Science Foundation under Grant CCR-0196364, Grant ECS-0121469, and Grant DMS-0312416.

Keywords

  • Blind multiuser detection
  • Robust multiuser detection
  • Second-order cone (SOC) programming

Fingerprint Dive into the research topics of 'Robust blind multiuser detection against signature waveform mismatch based on second-order cone programming'. Together they form a unique fingerprint.

Cite this