Multiuser Detection Algorithms for CDMA based on the Message Passing Algorithms Waseda University, Japan Shunsuke Horii To...
<ul><li>1 . Introduction </li></ul><ul><li>2 . CDMA model and multiuser detection </li></ul><ul><li>3 . The belief propaga...
<ul><li>Optimal detector for CDMA </li></ul><ul><ul><li>The MPM detector is optimal with respect to the Bit Error Rate. </...
<ul><li>In this study, we suggest that we can  reduce the computational complexity  of the message passing algorithms for ...
2 . Synchronous DS CDMA Channel Model with K users <ul><li>  </li></ul><ul><li>  </li></ul>【information bit】 【signature se...
2 . Synchronous DS CDMA Channel Model with K users Channel receiver Gaussian noise The signals of all users are multiplexe...
<ul><li>MPM detector is optimal with respect to the </li></ul><ul><li>Bit Error Rate (BER) :  </li></ul>【 MPM (Maximum Pos...
<ul><li>MPM detector is optimal. </li></ul><ul><li>But it’s computational complexity is   .  </li></ul><ul><li>Reduced com...
<ul><li>【 Factor Graph (FG) 】 </li></ul><ul><ul><li>A bipartite graph which expresses the structure of a factorization of ...
<ul><li>The BP and the CCCP </li></ul><ul><ul><li>When the factor graph has many cycles, </li></ul></ul><ul><ul><ul><li>th...
<ul><li>Message update rules of the BP </li></ul>neighboring nodes of  【 factor node->variable node 】 arguments of  neighb...
<ul><li>CCCP is a double loop algorithm </li></ul><ul><li>update rules of the  outer loop </li></ul>the number of neighbor...
<ul><li>In the past researches, the BP and the CCCP are already applied for the detection problem. </li></ul>5 . Approxima...
<ul><li>Number of the variable nodes which are connecting to a factor node is K. </li></ul>5 . Approximate BP Detector and...
<ul><li>To resolve the problem they reduced computational complexities of the algorithms through approximation. </li></ul>...
<ul><li>Factor graph expresses the structure of the factorization of a function. </li></ul><ul><li>We convert the graph st...
5 . Proposed BP Detector and   Proposed CCCP Detector <ul><li>The posterior distribution can be factorized as follows: </l...
5 . Proposed BP Detector and   Proposed CCCP Detector <ul><li>The posterior distribution can be factorized as follows: </l...
5 . Proposed BP Detector and   Proposed CCCP Detector <ul><li>In the Factor graph Ⅱ, the number of variable nodes which ar...
6 . Simulations Simulation Conditions Ⅰ . Comparison of the detectors with the bit error rate ※  assumption to approximate
6 . Simulations The performance of the BP for the Factor Graph Ⅱis not good. The performance of the CCCP for the Factor Gr...
The performance of the BP for the Factor graph Ⅱ is improved. The performance of the approx. CCCP for the FG Ⅰ is not good...
6 . Simulations Simulation Conditions Ⅱ . Comparison of the approx. CCCP for the FGⅠ and the CCCP for the FGⅡ
6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰ doesn’t decrease for the increase in the num...
6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰdecreases for the increase in the number of u...
7 . Discussions <ul><li>Relations between the graph structure and the performances of the detectors. </li></ul><ul><ul><li...
7 . Discussions <ul><li>Relations between the graph structure and the algorithms </li></ul><ul><ul><li>The CCCP for the Fa...
<ul><li>We showed that we can reduce the computational complexity of the BP and the CCCP for the detection problem by conv...
Appendix A
Appendix B
Upcoming SlideShare
Loading in...5
×

ma112006id337

290

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
290
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

ma112006id337

  1. 1. Multiuser Detection Algorithms for CDMA based on the Message Passing Algorithms Waseda University, Japan Shunsuke Horii Tota Suko Toshiyasu Matsushima
  2. 2. <ul><li>1 . Introduction </li></ul><ul><li>2 . CDMA model and multiuser detection </li></ul><ul><li>3 . The belief propagation and the concave convex procedure </li></ul><ul><li>4 . Detection algorithms based on the message passing algorithms </li></ul><ul><li>5 . Some performance analysis based on the numerical simulations </li></ul><ul><li>6 . Discussions </li></ul><ul><li>7 . Conclusion </li></ul>Contents
  3. 3. <ul><li>Optimal detector for CDMA </li></ul><ul><ul><li>The MPM detector is optimal with respect to the Bit Error Rate. </li></ul></ul><ul><ul><li>But the computational complexity of the MPM detector increases exponentially with the number of users. </li></ul></ul><ul><ul><li>-> There are many researches about alternative detectors. </li></ul></ul>1. Introduction detection problem can be regarded as   a probabilistic inference problem <ul><li>Message passing algorithms </li></ul><ul><ul><li>defined in terms of operations on a graph </li></ul></ul><ul><ul><li>compute marginal probability function efficiently </li></ul></ul><ul><li>Recently, detectors based on the message passing algorithms were developed. </li></ul><ul><ul><li>But it have been reported that the computational complexity of the message passing algorithms for the detection problem also increases exponentially with the number of users. </li></ul></ul>[Kabashima, 2003] [Tonosaki et al., 2004]
  4. 4. <ul><li>In this study, we suggest that we can reduce the computational complexity of the message passing algorithms for the detection problem by converting the graph structure . </li></ul>1. Introduction
  5. 5. 2 . Synchronous DS CDMA Channel Model with K users <ul><li>  </li></ul><ul><li>  </li></ul>【information bit】 【signature sequence】 : number of chips : chip cycle 【modulated signal】
  6. 6. 2 . Synchronous DS CDMA Channel Model with K users Channel receiver Gaussian noise The signals of all users are multiplexed. Gaussian noise is added.
  7. 7. <ul><li>MPM detector is optimal with respect to the </li></ul><ul><li>Bit Error Rate (BER) : </li></ul>【 MPM (Maximum Posterior Marginal) detector 】 Uniform Prior: Gaussian Channel: 3 . MPM detector
  8. 8. <ul><li>MPM detector is optimal. </li></ul><ul><li>But it’s computational complexity is . </li></ul><ul><li>Reduced computational complexity and good approximation algorithm is necessary. </li></ul><ul><ul><li>The detection problem can be regarded as </li></ul></ul><ul><ul><li>a probabilistic inference problem . </li></ul></ul><ul><ul><ul><li>There are many algorithms which compute a marginal of a posterior distribution efficiently, such as the Belief Propagation (BP) and the Concave-Convex Procedure (CCCP) . </li></ul></ul></ul>3 . MPM detector Computational Complexity Problem
  9. 9. <ul><li>【 Factor Graph (FG) 】 </li></ul><ul><ul><li>A bipartite graph which expresses the structure of a factorization of a joint distribution. </li></ul></ul><ul><ul><li>The BP and the CCCP can be defined in terms of operations on a factor graph. </li></ul></ul>4 . The Belief Propagation and the Concave Convex Procedure Ex. [Kschischang et al. 01]
  10. 10. <ul><li>The BP and the CCCP </li></ul><ul><ul><li>When the factor graph has many cycles, </li></ul></ul><ul><ul><ul><li>the BP and the CCCP both compute an approximation to a marginal probability function of each variable. </li></ul></ul></ul><ul><ul><ul><li>the BP does not always converge , while the CCCP is stable and probably convergent even when the BP does not converge . </li></ul></ul></ul><ul><ul><li>If the algorithms converge, the fixed point of the BP correspond to that of the CCCP. </li></ul></ul>4 . The Belief Propagation and the Concave Convex Procedure [Yedidia et al. 2005] [Yuille, 2002 ]
  11. 11. <ul><li>Message update rules of the BP </li></ul>neighboring nodes of 【 factor node->variable node 】 arguments of neighboring nodes of 【 variable node->factor node 】 【 belief 】 approximation to marginal probability function normalization constant 4 . The Belief Propagation and the Concave Convex Procedure computational complexity increases exponentially with the number of variable nodes which are connecting to a factor node
  12. 12. <ul><li>CCCP is a double loop algorithm </li></ul><ul><li>update rules of the outer loop </li></ul>the number of neighboring factor nodes of the variable node convergent value of in the inner loop <ul><li>update rules of the inner loop </li></ul>4 . The Belief Propagation and the Concave Convex Procedure After the enough number of the updates in the inner loop, the convergent value of the λ ai is used for the updates in the outer loop. computational complexity increases exponentially with the number of variable nodes which are connecting to a factor node
  13. 13. <ul><li>In the past researches, the BP and the CCCP are already applied for the detection problem. </li></ul>5 . Approximate BP Detector and Approximate CCCP Detector Factor graph Ⅰ [Kabashima, 2003] [Tonosaki et al., 2004]
  14. 14. <ul><li>Number of the variable nodes which are connecting to a factor node is K. </li></ul>5 . Approximate BP Detector and Approximate CCCP Detector <ul><li>The computational complexities of the BP and the CCCP become </li></ul>Update rule for the message of the BP Update rule for the inner loop of the CCCP
  15. 15. <ul><li>To resolve the problem they reduced computational complexities of the algorithms through approximation. </li></ul><ul><ul><li>Assumption: </li></ul></ul>5 . Approximate BP Detector and Approximate CCCP Detector
  16. 16. <ul><li>Factor graph expresses the structure of the factorization of a function. </li></ul><ul><li>We convert the graph structure by changing the factorization. </li></ul>5 . Proposed BP Detector and Proposed CCCP Detector Point There are many ways to factorize. Point in our proposition
  17. 17. 5 . Proposed BP Detector and Proposed CCCP Detector <ul><li>The posterior distribution can be factorized as follows: </li></ul>Sufficient statistics Cross correlations
  18. 18. 5 . Proposed BP Detector and Proposed CCCP Detector <ul><li>The posterior distribution can be factorized as follows: </li></ul>Factor graph Ⅱ(proposed)
  19. 19. 5 . Proposed BP Detector and Proposed CCCP Detector <ul><li>In the Factor graph Ⅱ, the number of variable nodes which are connecting to a factor node is at most 2. </li></ul><ul><li>The BP and the CCCP can be applied in the same way of the definition. </li></ul>Factor graph Ⅱ(proposed)
  20. 20. 6 . Simulations Simulation Conditions Ⅰ . Comparison of the detectors with the bit error rate ※ assumption to approximate
  21. 21. 6 . Simulations The performance of the BP for the Factor Graph Ⅱis not good. The performance of the CCCP for the Factor Graph Ⅱis near to the MPM detector’s performance
  22. 22. The performance of the BP for the Factor graph Ⅱ is improved. The performance of the approx. CCCP for the FG Ⅰ is not good. 6 . Simulations ※Absolute values of the cross correlations tends to take small values when the length of the signature sequence is large.
  23. 23. 6 . Simulations Simulation Conditions Ⅱ . Comparison of the approx. CCCP for the FGⅠ and the CCCP for the FGⅡ
  24. 24. 6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰ doesn’t decrease for the increase in the number of updates in the outer loop.
  25. 25. 6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰdecreases for the increase in the number of updates in the outer loop. imply The approx. CCCP for the Factor Graph Ⅰ needs more number of updates in the Inner loop.
  26. 26. 7 . Discussions <ul><li>Relations between the graph structure and the performances of the detectors. </li></ul><ul><ul><li>The BP is not appropriate for the factor graph Ⅱ when the absolute values of the cross correlations are large. </li></ul></ul>Reason It seems to me that the fact that “the strengths of functions are strong, the BP tends to not converge” is one of reasons. Ref.[Welling and Teh, 2001] ※
  27. 27. 7 . Discussions <ul><li>Relations between the graph structure and the algorithms </li></ul><ul><ul><li>The CCCP for the Factor graph Ⅱ outperform the approximate CCCP for the Factor graph Ⅰ. </li></ul></ul>Reason It seems to me, the number of edges effects on the necessary number of updates for the CCCP to converge. The number of edges is reduced in the Factor graph Ⅱ.
  28. 28. <ul><li>We showed that we can reduce the computational complexity of the BP and the CCCP for the detection problem by converting the graph structure. </li></ul>8 . Conclusion <ul><li>We obtained the relations between the graph structure and the performances of the algorithms with computer simulations. </li></ul>
  29. 29. Appendix A
  30. 30. Appendix B
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×