2009
DOI: 10.1007/s11277-009-9679-2
|View full text |Cite
|
Sign up to set email alerts
|

The Linearly Constrained LSCMA for Blind Multi-user Detection

Abstract: The least square constant modulus algorithm (LSCMA) is a popular constant modulus algorithm (CMA) because of its global convergence and stability. But the performance will degrade when it is affected by the problem of interference capture in the MC-CDMA system that has several constant modulus signals. In order to overcome this shortage, a linearly constrained LSCMA multiuser detection algorithm is proposed by using the spreading code of the desired user to impose linear constraint on the LSCMA. The proposed a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Nevertheless, they could be computationally complex since they may require significantly long observation time. Several blind approaches (i.e., when the process of recovering data from multiple simultaneously transmitting users without access to any training sequences) have been addressed in the literature (Buzzi et al, 2010;Khodadad, Ganji & Mohammad, 2010;Khodadad, Ganji & Safaei, 2010;Meng et al, 2010;Yu et al, 2011;Zhang et al, 2011). However, most of them require some prior knowledge about users parameters such as signature waveform, processing gain, pseudo-noise code (for a particular group of active users) or chip rate.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, they could be computationally complex since they may require significantly long observation time. Several blind approaches (i.e., when the process of recovering data from multiple simultaneously transmitting users without access to any training sequences) have been addressed in the literature (Buzzi et al, 2010;Khodadad, Ganji & Mohammad, 2010;Khodadad, Ganji & Safaei, 2010;Meng et al, 2010;Yu et al, 2011;Zhang et al, 2011). However, most of them require some prior knowledge about users parameters such as signature waveform, processing gain, pseudo-noise code (for a particular group of active users) or chip rate.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, they could be computationally complex since they may require significantly long observation time. Several blind approaches (i.e., when the process of recovering data from multiple simultaneously transmitting users without access to any training sequences) have been addressed in the literature (Buzzi et al, 2010;Khodadad, Ganji & Mohammad, 2010;Khodadad, Ganji & Safaei, 2010;Meng et al, 2010;Yu et al, 2011;. However, most of them require some prior knowledge about users parameters such as signature waveform, processing gain, pseudo-noise code (for a particular group of active users) or chip rate.…”
Section: Introductionmentioning
confidence: 99%