Efficient DS-UWB MUD Algorithm Using Code Mapping and RVM

A hybridmultiuser detection (MUD) using codemapping and awrong code recognition based on relevance vectormachine (RVM) for direct sequence ultra wide band (DS-UWB) system is developed to cope with the multiple access interference (MAI) and the computational efficiency. A new MAI suppression mechanism is studied in the following steps: firstly, code mapping, an optimal decision function, is constructed and the output candidate code of the matched filter is mapped to a feature space by the function. In the feature space, simulation results show that the error codes caused byMAI and the single user mapped codes can be classified by a threshold which is related to SNR of the receiver. Then, on the base of code mapping, use RVM to distinguish the wrong codes from the right ones and finally correct them. Compared with the traditional MUD approaches, the proposed method can considerably improve the bit error ratio (BER) performance due to its special MAI suppression mechanism. Simulation results also show that the proposed method can approximately achieve the BER performance of optimal multiuser detection (OMD) and the computational complexity approximately equals the matched filter. Moreover, the proposed method is less sensitive to the number of users.


Introduction
Ultra wide band (UWB) is an attractive wireless communication technology for its characteristics of high data transmission rate, low power density, high interference resistance, strong multipath resolution, and so on [1][2][3].The application range of UWB has been broadened to Wireless Local Area Networks (WLAN), Wireless Sensor Networks (WSN), radar detection, and high-speed communications of indoor and outdoor applications [4][5][6].
There are mainly two standard schemes of UWB formulated by IEEE 802.15.3a, that is, the multiband-based orthogonal frequency division multiplexing (MB-OFDM) and impulse-radio-based direct sequence UWB (DS-UWB) [7].Compared with MB-OFDM scheme, DS-UWB has many attractive advantages such as low peak-to-average power ratio, significant ability of information hidden, and less sensitivity to multipath fading [8,9].In a sense, the multiple access scheme of DS-UWB is similar to code division multiple access (CDMA) systems; both of them use pseudorandom (PN) codes to distinguish different users.However, as in conventional CDMA systems, DS-UWB systems also suffer from the multiple access interference (MAI).The optimal multiuser detector (OMD) proposed by Verdu [10] could achieve the single user's BER performance, but it had a very high computational complexity and was too expensive to handle [11].Therefore, suboptimal detectors which may approximate OMD's BER performance with an acceptable computational complexity have become a focus of research.In recent years, artificial swarm algorithms are widely used in multiuser detection (MUD).Literature [12] investigates an efficient multiuser detector by selection of initial states based on code mapping for the artificial bee colony algorithm.A complexity-performance-balanced MUD method based on artificial fish swarm algorithm for DS-UWB is introduced in [13]; the BER performance of these methods can approximate the performance of OMD while these artificial swarm algorithms need iterated operation.

Mathematical Problems in Engineering
A multiuser frequency-domain turbo detector was employed which combines FD turbo equalization schemes with soft interference cancellation [14].A code-aided interference suppression method was introduced for narrow band interference restriction in DS-UWB systems [15].Adaptive MUD methods using the recursive least square (RLS) principles were studied in [16,17].In [18], a low-complexity approximate SISO MUD using soft interference cancellation and linear minimum mean square error (MMSE) filtering for coded CDMA system was introduced.However, few studies were reported that can approximate OMD's BER performance with a computational complexity approximates to linear MUD.
In this paper, a novel MUD algorithm which combines a code mapping method and a wrong code recognition based on RVM is proposed to achieve a BER performance approximate to OMD method with a very low complexity which almost equals the complexity of matched filter.
The remainder of this paper is organized as follows.In Section 2, the DS-UWB system models are introduced.And in Section 3, the principles of the proposed algorithm are described, respectively.In Section 4, simulation results that compare the performance of the proposed algorithm and other approaches are illustrated and discussed, followed by conclusions given in Section 5.

System Models
Consider a -user asynchronous DS-UWB system in additive white Gaussian noise (AWGN) channel, and assume that each user employs the binary phase-shift key (BPSK) modulation.In this paper, Scholtz's monocycle is used as the UWB pulse waveform, which is approximated to the second derivation of Gaussian pulse.And the expression of Scholtz's monocycle is [19] where   and   are the pulse center and the pulse shape parameter, respectively.At the transmitter  ( = 1, 2, . . ., ), BPSK symbols   () ∈ {−1, 1}  =1 are spread with the specific PN codes   (), which are the binary bit stream valued only by −1 or 1, and  is the length of bits per packet.The symbol duration is denoted by   .We consider that each BPSK symbol can be divided into   chips each with duration   , where   equals   /  .In each chip, a monocycle () is transmitted with the duration of   to represent the sign of the chip.Practically, the duration of a chip is much longer than the duration of a UWB pulse; that is,   ≫   .The th user's transmission signal can be written as where   represents the random delay of the th transmitter's monocycle, 0 ≤   <   .
Assume that each transmitter uses a time-invariant multipath channel in the same band.Let ℎ() represent the impulse response of the transmission channel.Furthermore, suppose that UWB signals reach the receiving antenna by  different paths.The channel impulse response can be written as [20] The received signal that is transmitted from the th user is given by where * denotes convolution operator.The total received signal can be written as where () is zero-mean additive white Gaussian noise (AWGN) with the unilateral power spectral density of  0 .
In the receiver, the traditional receiver of a DS-UWB system consists of a pulse demodulator and a set of matched filters corresponding to each user.Regard signal () as the input of the group of matched filters.Furthermore, the inter symbol interference (ISI) can be ignored when the base-band signal transmission rate is much lower than the UWB pulse rate.
Let vector y = [ 1 ,  2 , . . .,   ]  represent the output of the matched filter group, and let vector b = [ 1 ,  2 , . . .,   ]  represent the output of sign detectors, so the output of the matched filters can be represented as follows: where the vector d = [ 1 ,  2 , . . .,   ]  denotes the correct bits of each user and the vector n = [ 1 ,  2 , . . .,   ]  denotes the output of the AWGN from each user's corresponding matched filter, while the random variable   is normally distributed and [  ] = 0 and [  ] =  0   /2, R = (  ) × denotes the cross-correlation matrix, where represents the signal amplitude of the th user.

The Proposed Hybrid Multiuser Detection
The main purpose of the proposed method is to pick out the error codes among the received signals and correct them.Firstly, the received codes are mapped into a feature space to make the error codes and the right ones different in some properties which can be easily distinguished.Secondly, identify and pick out the wrong codes by using some approaches in the feature space.code mapping, the second stage is corresponding to features extraction for RVM, and the third stage is corresponding to classification of the codes based on RVM and correcting the wrong codes.

Code Mapping.
Here, a mapping function is constructed to map the output codes set of the matched filter to a onedimensional feature space [21].
According to the theory of optimal multiuser detection described in [22], optimal multiuser detection computes the likehood function and selects the sequence {  , 1 ≤  ≤ } that minimizes Λ(b).Thus the output of OMD can be expressed as It can be easily seen that ( 9) needs 2  trials to get the expected b.The computational complexity of OMD is too high.Thus other methods need to be explored to suppress the multiple access interference.Let According to (9), it can be seen that when the value of function (b) achieves the minimum, the optimal b can be obtained.By expanding (10), we get From ( 10) and (11), it is clear that function (b) is a quadratic form of vector b, which means this is a nonlinear equation with the order of two.And it is not easy to solve the minimum of (b) and the corresponding value of b.In addition, the function (b) embraces cross-component     (,  = 1, 2, . . ., ,  ̸ = ), and we cannot judge a code independently by (b).Hence, it is not appropriate for function (b) to be the mapping function.
In this case, it is better to calculate the derivative of function (b) to decrease the order of mapping function.Making the partial derivation of (10), we get By expanding (12), we get th-order linear equations given as follows: Because (b) is a discrete equation, we cannot just set the partial derivative described above equal to 0 and get the stationary point of (b).Let (  ) = ∑  =1         −     ,  = 1, 2, . . ., .Substituting the candidate sequence b into (13) (the output of matched filter as shown in (7) or results of other conventional suboptimal multiuser detectors can be employed as the candidate sequence b), there will be two situations as discussed below.
(1) No Wrong Code in b.Based on the theory of extreme value, if MAI is the only interference resource without AWGN and the elements in b are all correct, the result of ( 13) strictly equals 0. And in the condition of high SNR, substituting (6) into (  ), we can see that (  ) = −    ∼ (0,  2      0 /2) ( = 1, 2, . . ., ) when there is no error bit in the candidate codes set b.
(2) Wrong Codes Exist in b.Suppose that   ( ∈ [1, ],  ∈ ) is the wrong code (in other words, −  is the correct code); the other codes are correct.Substituting it to the th equation of ( 13), we get As for  which is not equal to , we get According to ( 14) and ( 15 It is accessible to map b into a one-dimension feature space |(b)| to identify the wrong codes in the candidate set. Figure 2 shows an example of the feature space mapping in the scenario of 10 users, with 6 dB signal-to-noise ratio (SNR).|(b)| of 3200 codes are shown in this figure (candidate b is selected from the result of matched filter as in (7)).
According to Figure 2, it is clear that the wrong codes and the right ones have a significant difference in the feature space mapped by |(b)|.[23], a sparse Bayesian modeling approach, which enables sparse classification and regression functions to be obtained by linearly weighting a small number of fixed basis functions from a large dictionary of potential candidates.And a significant advantage to support vector machine is that the kernel function of RVM avoids satisfying Mercer's condition [24][25][26].

Theory of RVM. Tipping proposed the relevance vector machine (RVM) in
In classification, the output function () is defined by where () = 1/(1 +  − ) and  denotes the weight matrix.Suppose  is a Gaussian conditional probability [27], with the 0 expectation and variance  −1  .For two classes' classification, the likelihood function is defined by where   ∈ (0, 1) denote the target value.
Seeking the maximum posterior probability estimation is equivalent to seeking the mode point of the Gaussian function, namely,  MP .
Due to the fact that the maximum posterior probability estimation according to  is equivalent to maximize where   = {(  , )} and  denotes a constant.Similarly, the marginal likelihood function can be given by Suppose t = Φ  MP + B −1 (t − y), the approximation of the Gaussian posterior distribution; that is,  MP = ΣΦ  B t, with the variance Σ = (Φ  BΦ + A) −1 .The logarithm of the approximate marginal likelihood function is given by where C = B + ΦA −1 Φ  .Reference [28] proposed fast marginal likelihood maximization for sparse Bayesian models, which can reduce the learning time of RVM effectively.To simplify forthcoming expressions, it is defined that It is showed that (20) has a unique maximum with respect to   :

Wrong Codes Recognition Using RVM.
We use RVM clustering approach to classify the candidate codes into right bits and wrong ones.Firstly, get the output of the matched filters by ( 6) and ( 7), the output of the matched filter group is y, and the output of sign detectors is b.Secondly compared with the vector b and the correct bits vector d, we can classify the candidate codes into right set  1 and wrong set

Results and Discussions
In this section, simulation results are presented in order to show the superiority of the hybrid multiuser detector using code mapping based on relevance vector machine with respect to both system performance improvement and computational complexity reduction.We present simulation results for the performance of a DS-UWB system with four types of multiuser detector: (1) the matched filter detector; (2) the MMSE multiuser detector; (3) the OMD; and (4) the proposed hybrid multiuser detector.Set the chip transmission rate as 2.55 GHz with the UWB transmission bandwidth 4∼8 GHz and use length 255 Kasami spreading codes for the transmitters.Assume that the signal was transmitted in two typical channels: one is AWGN channel without ISI and the other is IEEE 802.15.3a multipath channel and the multipath signal is processed by a selective-RAKE (SRAKE) receiver with 8 branches and using MRC (Maximal Ratio Combining) rule.Our main objective was to examine a receiver's BER which directly bases the performance of the receiver on the condition of different SNR environments.In addition, we can check the recognition rate to identify the SNR in this scenario.

Results of Experiment 1: BER Performance versus SNR.
First, consider the AWGN channel environment and IEEE 802.15.3a channel model (without loss of generality, CM2 channel is studied in the simulation experiment).There are four kinds of detectors to be simulated: matched filter detector, MMSE detector, OMD, and the proposed hybrid multiuser detector.The number of transmitters is set to 10, the spread spectrum gain   equals 255, and the range of SNR output from the receiver is 0 dB∼12 dB.The curves of BER performance versus SNR are depicted in Figure 3.
As shown in Figure 3, on the whole, the BER performance of the hybrid multiuser detector is superior to that of the matched filter detector and the MMSE detector in both AWGN channel and the IEEE 802.15.3a multipath CM2 channel.Especially in conditions of high SNR (greater than 8 dB), the detection performance of the hybrid multiuser detector is much better than that of the other two detectors (approximately 1∼3 orders of magnitude higher).Hence, what is more important is that the BER performance of the hybrid multiuser detector is very close to that of OMD.In theory, the OMD can completely eliminate the MAI and can arrive at the lower limit of BER in the condition of multiple users.This means that the hybrid multiuser detector can correct almost all the wrong codes caused by MAI.Another experiment was carried out to study the BER performance of the proposed hybrid MUD method in different IEEE 802.15.3a channel models, which is presented in Figure 4. Seen from Figure 4, the proposed method is sensitive to channel environments; the performance trend worsened with the deterioration of the channel environment.

Results of Experiment 2:
User Capacity of System.Furthermore, consider another situation with different number of transmitters under the same SNR condition.To make the comparison apparent, the algorithms of matched filter detector MMSE and hybrid multiuser detector are simulated.The simulation results are shown in Figure 5 with the SNR of 4 dB, 6 dB, 8 dB, and 10 dB; the other simulation environments yield the same results as BER performance.
Based on the results in Figure 5, it can be seen that the BER performance of the hybrid multiuser detector remains nearly unchanged with an increase in the number of transmitters compared with that of the matched filter receiver.This shows that the hybrid multiuser detection can suppress multiaccess interference.Therefore, under the stated specific SNR conditions, the hybrid multiuser detector is still able to give a superior detection performance when there are many transmitters occupying the same channel simultaneously, which indicates that the BER performance of the hybrid multiuser detector is not sensitive to the channel capacity.This is one of the great advantages of this type of detector.

Results of Experiment 3:
The Near-Far Effect (NFE) Resistant Capability.Due to the spatial distribution of terminals, NFE is one of the outcomes in Multiple Address (MA) systems, which is discussed in this simulation in both AWGN channel and IEEE 802.15.3aCM2 channel.In this experiment, the number of users was set as 10; the first user received signal with the stationary SNR of 6 dB, while in that of other users, SNR varies from 0 to 12 dB synchronously.And other parameters are the same as those in the former experiments.
The near-far effect resistant abilities of different multiuser detector in both AWGN channel and IEEE 802.15.3aCM2 channel are shown in Figure 6.It is evident that the matched filter detector has the worst NFE resistance ability, and both the proposed hybrid multiuser detector and the MMSE have the stronger NFE resistant ability compared to matched filter detector.However, considering the BER performance of them, hybrid MUD is the best.1, it can be seen that the computational complexity of the proposed hybrid multiuser detector is much lower than that of OMD.And it is in the same order of magnitude to matched filter and MMSE.Thus the proposed multiuser detector based on code mapping and RVM can get good BER performance with computational complexity.

Conclusions
In this paper, a new MAI suppression mechanism is proposed for multiuser detection of DS-UWB system.The algorithm embraces three steps.First, as the output of matched filters, the candidate codes set is mapped into a one-dimensional feature space by the optimal decision function.The purpose is to make the right codes and wrong codes easy to be  distinguished.Second, calculate the statistical characteristics of the codes in the feature space.Third, use RVM classifier to classify the receiver multiuser function mapping characteristic value, and then correct the wrong codes by sign reversal.The simulation results show that the BER performance and the near-far effect resistant abilities of the new MAI suppression mechanism are superior to those of the matched filter detector and the MMSE detector in both AWGN channel and IEEE 802.15.3a channel, especially when the output SNR is greater than 8 dB.Its performance is very close to that of OMD.Compared to the OMD, the new MAI suppression mechanism has lower computational complexity that increases linearly with the number of users.Hence, we conclude that the new MAI suppression mechanism can give an admirable detection performance under high SNR and large number of users, which is very useful for practical applications.Furthermore, the performance of the new MAI suppression mechanism can hardly be influenced by changes in numbers of users, which means that this hybrid approach for multiuser detection will be an efficient method to solve

Figure 1 :
Figure 1: The block diagram of the receiver.
), we can see when the th user's code is wrong; then we get |(  )| ≫ |(  )|,  = 1, 2, . . ., ,  ̸ = .Therefore, the function (b) can obviously differentiate the wrong codes and the right codes through the absolute value of it.In addition, (b) is th-order linear equations which can get the result of (b) without complex computations.In conclusion, it is appropriate to set |(b)| as the optimal decision function in the hybrid MUD algorithm.

2
; let  1 and  2 be the training samples to train the RVM.Thirdly two useful feature parameters of the training samples can be extracted below: y and |(b)|.Fourthly use the training samples  1 and  2 to train the RVM.Fifthly use the trained RVM clustering approach to classify the candidate codes into right bits and wrong ones.

Figure 4 :
Figure 4: BER performance of the proposed method in 4 IEEE 802.15.3a channels.

Table 1 :
The relative execution time of different multiuser detectors.computationstofind the maximum one ( is the number of users).The multiuser proposed in this paper computes the mapping function |(  )| and employs RVM to distinguish the wrong codes and then correct them.Let the execution time of matched filter normalize to 1.In an environment of 10user AWGN channel, Table1lists the relative execution time of matched filter, MMSE, OMD, and the proposed hybrid MUD.From Table Ay − b  ARAb) needs 2