INTERFERENCE avoidance has emerged in the literature

Similar documents
An orthogonal multi-beam based MIMO scheme. for multi-user wireless systems

DOWNLINK TRANSMITTER ADAPTATION BASED ON GREEDY SINR MAXIMIZATION. Dimitrie C. Popescu, Shiny Abraham, and Otilia Popescu

Transmit Power and Bit Allocations for OFDM Systems in a Fading Channel

Performance of Multiuser MIMO System Employing Block Diagonalization with Antenna Selection at Mobile Stations

Power Optimal Signaling for Fading Multi-access Channel in Presence of Coding Gap

Keywords Frequency-domain equalization, antenna diversity, multicode DS-CDMA, frequency-selective fading

A Frequency Domain Approach to Design Constrained Amplitude Spreading Sequences for DS-CDMA Systems for Frequency Selective Fading Channels

Transmit Beamforming and Iterative Water-Filling Based on SLNR for OFDMA Systems

Kalman Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environment

Performance Analysis of an AMC System with an Iterative V-BLAST Decoding Algorithm

Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Information

A soft decision decoding of product BCH and Reed-Müller codes for error control and peak-factor reduction in OFDM

COMBINED FREQUENCY AND SPATIAL DOMAINS POWER DISTRIBUTION FOR MIMO-OFDM TRANSMISSION

Receiver Design for Downlink MIMO MC-CDMA in Cognitive Radio Systems

Using Adaptive Modulation in a LEO Satellite Communication System

Distributed Resource Allocation Assisted by Intercell Interference Mitigation in Downlink Multicell MC DS-CDMA Systems

Design and Implementation of Block Based Transpose Form FIR Filter

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks

Multicarrier Interleave-Division Multiple Access Communication in Multipath Channels

Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity

Outage Probability of Alamouti based Cooperative Communications with Multiple Relay Nodes using Network Coding

Relay Deployment for AF-MIMO Two-Way Relaying Networks with Antenna Selection

On Capacity of Wireless Ad Hoc Networks with MIMO MMSE Receivers Jing Ma, Member, IEEE and Ying Jun (Angela) Zhang, Member, IEEE

OPTIMIZE THE POWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS

Modeling Beam forming in Circular Antenna Array with Directional Emitters

PARAMETER OPTIMIZATION OF THE ADAPTIVE MVDR QR-BASED BEAMFORMER FOR JAMMING AND MULTIPATH SUPRESSION IN GPS/GLONASS RECEIVERS

Adaptive Harmonic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor

Radio Resource Management in a Coordinated Cellular Distributed Antenna System By Using Particle Swarm Optimization

Space-Frequency Block Code for MIMO-OFDM Communication Systems with Reconfigurable. antennas.

SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS

AN IMPORTANT characteristic of future generations of

RAKE Receiver. Tommi Heikkilä S Postgraduate Course in Radio Communications, Autumn II.

Notes on Orthogonal Frequency Division Multiplexing (OFDM)

Evolutionary Computing Based Antenna Array Beamforming with Low Probabality of Intercept Property

Evolutionary Computing Based Antenna Array Beamforming with Low Probabality of Intercept Property

A Novel TDS-FDMA Scheme for Multi-User Uplink Scenarios

DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition

Receive Antenna Subset Selection For Time-Varying Channels Using Slepian Subspace Projections

International Journal of Electronics and Electrical Engineering Vol. 1, No. 3, September, 2013 MC-DS-CDMA

Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systems

LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA System

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

ORTHOGONAL frequency division multiplexing (OFDM) has become the most popular multicarrier

ARecent report pointed out that in 2014 the amount of data

Allocation of Multiple Services in Multi-Access Wireless Systems

Performance Analysis of Atmospheric Field Conjugation Adaptive Arrays

Iterative Receiver Signal Processing for Joint Mitigation of Transmitter and Receiver Phase Noise in OFDM-Based Cognitive Radio Link

ELECTROMAGNETIC COVERAGE CALCULATION IN GIS

4G Communication Resource Analysis with Adaptive Physical Layer Technique

POWER QUALITY ASSESSMENT USING TWO STAGE NONLINEAR ESTIMATION NUMERICAL ALGORITHM

Introduction Traditionally, studying outage or cellular systes has been based on the signal-to-intererence ratio (SIR) dropping below a required thres

ME-SSA: an Advanced Random Access for the Satellite Return Channel

SIG: Signal-Processing

Overlapped frequency-time division multiplexing

Energy-Efficient Cellular Communications Powered by Smart Grid Technology

Joint Transmitter-Receiver Beamforming in Downlink Cyclic Prefix-free Spatio-Temporal MC-CDMA

Resource Allocation for OFDMA-Based Relay Assisted Two-Tier Femtocell Networks

Study and Implementation of Complementary Golay Sequences for PAR reduction in OFDM signals

Implementation of Adaptive Viterbi Decoder

Interference Management in LTE Femtocell Systems Using Fractional Frequency Reuse

Linear Precoding Gain for Large MIMO Configurations with QAM and Reduced Complexity

Research Article Dynamic Beamforming for Three-Dimensional MIMO Technique in LTE-Advanced Networks

A New Localization and Tracking Algorithm for Wireless Sensor Networks Based on Internet of Things

Simplified Analysis and Design of MIMO Ad Hoc Networks

Optical fiber beamformer for processing two independent simultaneous RF beams

Error Control Coding in Optical Fiber Communication Systems: An Overview

A Novel NLOS Mitigation Approach for Wireless Positioning System

A Selection Region Based Routing Protocol for Random Mobile ad hoc Networks with Directional Antennas

Selective Harmonic Elimination for Multilevel Inverters with Unbalanced DC Inputs

Multi-Objective Resource Allocation in Full-Duplex SWIPT Systems

Phase Noise Modelling and Mitigation Techniques in OFDM Communications Systems

CODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems

Overlapping Signal Separation in DPX Spectrum Based on EM Algorithm. Chuandang Liu 1, a, Luxi Lu 1, b

Spectrum Sensing in Low SNR: Diversity Combining and Cooperative Communications

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

New Characteristics Analysis Considering Transmission Distance and Load Variation in Wireless Power Transfer via Magnetic Resonant Coupling

A Pre-FFT OFDM Adaptive Antenna Array with Eigenvector Combining

EQUALIZED ALGORITHM FOR A TRUCK CABIN ACTIVE NOISE CONTROL SYSTEM

Intermediate-Node Initiated Reservation (IIR): A New Signaling Scheme for Wavelength-Routed Networks with Sparse Conversion

Alternative Encoding Techniques for Digital Loudspeaker Arrays

Enhanced Algorithm for MIESM

MOBILE OPTICAL WIRELESS SYSTEM FOR HEALTHCARE CONTINUOUS MONITORING USING IR TECHNOLOGY

Performance Evaluation of UWB Sensor Network with Aloha Multiple Access Scheme

Joint user clustering and resource allocation for device-to-device communication underlaying MU-MIMO cellular networks

Track-Before-Detect for an Active Towed Array Sonar

Precise Indoor Localization System For a Mobile Robot Using Auto Calibration Algorithm

Design of an Arrayed Waveguide Grating with flat spectral response

Performance Analysis of OFDM Broadband Communications System Over Low Voltage Powerline with Impulsive Noise

Beacon-driven Leader Based Protocol over a GE Channel for MAC Layer Multicast Error Control

Distributed Power Delivery for Energy Efficient and Low Power Systems

On the Reverse Link Capacity of cdma2000 High Rate Packet Data Systems

DIRECT MAPPING OVSF-BASED TRANSMISSION SCHEME FOR UNDERWATER ACOUSTIC MULTIMEDIA COMMUNICATION

A Comparison of Convolutional and Turbo Coding Schemes For Broadband FWA Systems

ANALYSIS AND OPTIMIZATION OF SYNTHETIC APERTURE ULTRASOUND IMAGING USING THE EFFECTIVE APERTURE APPROACH. Milen Nikolov, Vera Behar

Energy Efficient Space Time Line Coded Regenerative Two-Way Relay Under Per-Antenna Power Constraints

COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS. M.E. Ulug

Uplink blocking probability calculation for cellular systems with WCDMA radio interface and finite source population

Research Letter Chip-Level HARQ Chase Combining for HSUPA

A New Simple Model for Land Mobile Satellite Channels

WIRELESS video sensor networks (WVSNs) are capable

Transcription:

1466 IEEE TANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 8, AUGUST 2007 Interference Avoidance and Multiaccess Vector Channels Diitrie C. Popescu, Senior Meber, IEEE, Otilia Popescu, Meber, IEEE, and Christopher ose, Fellow, IEEE Abstract In this paper we present application of interference avoidance in the context of a general ultiple access vector channel odel. We show that this onotonically increases su capacity, and discuss algoriths for code division ultiple access (CDMA) codeword optiization based on this procedure. A greedy interference avoidance algorith for ultiaccess vector channels is presented in the paper, for which we discuss convergence to a class of codeword ensebles that satisfy a siultaneous water filling solution and axiize su capacity. Nuerical results obtained fro siulations that corroborate our analytical results are also presented. Index Ters CDMA, distributed codeword adaptation, interference avoidance, vector channels. I. INTODUCTION INTEFEENCE avoidance has eerged in the literature as a ethod for transitter optiization that provides distributed algoriths for codeword adaptation in CDMA systes [1] [5]. Using interference avoidance, CDMA codewords are independently adapted by users in response to changing patterns of interference through an iterative process which requires only that each user has access to the syste covariance inforation and now its channel to the base station (which ay be obtained through a feedbac channel [6], [7] fro the base station). The distributed nature of interference avoidance algoriths also aes the applicable to dynaic systes with changing nubers of active users and/or quality of service (QoS) requireents through adaptive/increental ipleentations [8] [10]. This is different fro centralized CDMA codeword optiization algoriths [11] [18] that are perfored at the base station without considering the channels between the users and the base, which are static in the nuber of users and assign optial codewords to users upon coputing the. Moreover, centralized algoriths do not allow variable QoS, and are not aenable to dynaic systes [19] and/or adaptive ipleentations. Using CDMA codewords that are optiized for particular counication channels can also iprove perforance. Wireless channels are in general dispersive due to the existence of ultiple paths between the transitter and receiver, and algoriths for optiizing codewords in ultipath CDMA channels have been proposed in [20] [22]. We note that interference Paper approved by. Schober, the Editor for Wireless Counication of the IEEE Counications Society. Manuscript received October 17, 2005; revised May 17, 2006 and Noveber 4, 2006. This wor was presented in part at the 2002 IEEE International Syposiu on Inforation Theory. D. C. Popescu is with the Departent of Electrical and Coputer Engineering, Old Doinion University, Norfol, VA 23529 USA (e-ail: dpopescu@odu.edu). O. Popescu and C. ose are with the Wireless Inforation Networ Laboratory (WINLAB), utgers The State University of New Jersey, Technology Center of New Jersey, North Brunswic, NJ 08902-3390 USA (e-ail: otilia@winlab.rutgers.edu; crose@winlab.rutgers.edu). Digital Object Identifier 10.1109/TCOMM.2007.902528 avoidance algoriths can also be used to obtain optial CDMA codewords for ultipath and dispersive channels [5], [23]. In this paper we present application of interference avoidance in the context of a general ultiple access vector channel odel. This wor extends the use of interference avoidance fro the dispersive channel odel in [5] in which user channel atrices were restricted to be diagonal, to a vector channel with no restrictions on user channel atrices. Such a channel odel provides a theoretical fraewor for the analysis of a wide variety of counication scenarios, which include CDMA systes with synchronous or asynchronous users that transit over channels with eory or channels with ultiple antennas in the transitter and/or receiver. Exaples of ultiaccess vector channels in the wireless literature are available in [22], [24] [26]. We note that coplex-valued ultiacces vector channels that ay occur in the context of ultiple antenna and/or OFDM-based systes are always representable in ters of a real-valued ultiaccess vector channel of double diension by using the isoorphis between the field of coplex nubers and the field of 2 2 real and sew-syetric atrices which is discussed in ore details in [5]. For siplicity of the atheatical presentation and with no loss of generality we choose to wor with real-valued ultiacces vector channels in our paper. The paper is organized as follows: in Section II, we present the syste odel under consideration, and state our proble. In Section III, we show how interference avoidance applies in the context of ultiaccess vector channels for a given user through whitening of the interference-plus-noise and projection of the received signal onto its corresponding signal space. In Section IV, we present a greedy interference avoidance algorith for ultiaccess vector channels, for which we discuss fixed point properties and convergence to optial codeword ensebles which axiize su capacity and present nuerical results obtained fro siulations. Final rears and conclusions are presented in Section V. II. POBLEM STATEMENT We consider a syste with L users that transit to a coon receiver as it is the case in the uplin of a wireless counication syste where several obile terinals counicate with the sae base station. We assue that distinct users transit signals residing in different signal spaces, with possibly different diensions and potential overlap aong the, and all being subspaces of the receiver signal space. Each user s signal space as well as the receiver signal space are of finite diension as iplied by a finite signaling interval T and finite bandwidths W l for each user l, and W (which includes all W l s corresponding to all users) for the receiver [27]. Matheatically this syste is 0090-6778/$25.00 2007 IEEE

POPESCU et al.: INTEFEENCE AVOIDANCE AND MULTIACCESS VECTO CHANNELS 1467 described by a ultiaccess vector channel equation r = H l x l + n (1) l=1 where x l of diension N l is the input vector corresponding to user l, l =1,...,L,r of diension N N l is the received vector at the coon receiver corrupted by the additive Gaussian noise vector n of the sae diension N with covariance atrix W = E[nn ].TheN N l channel atrix H l corresponding to user l defines a linear transforation between user l s signal space and the receiver signal space, and is the atheatical representation of the physical channel between user l and the base station that ebeds characteristics lie attenuation, ultipath, or ultiple antennas [5], [22] [26]. In this signal space setting, a given user l (l =1,...,L) transits a frae of M l inforation sybols b l = [b (l) 1...b(l) M l ] using a ulticode CDMA approach: each sybol b (l) in user l s frae is assigned a distinct codeword s (l), and the transitted signal by user l is a superposition of all codewords scaled by their corresponding inforation sybols. Thus, user l transits the signal vector x l = M l =1 s (l) b (l) = S l b l (2) where S l =[s (l) 1...s(l)...s (l) M l ] is the N l M l codeword atrix corresponding to user l whose coluns s (l), = 1,...,M l, are the codewords assigned to each of the M l sybols in user l s frae. We assue that all codewords have the sae nor equal to one so that user l transitted power is P l = Trace [S l S l ]=M l, l =1,...,L. (3) The received signal at the coon receiver is rewritten as r = H l S l b l + n. (4) l=1 In this paper, we extend application of interference avoidance fro the dispersive CDMA channel odel in [5] in which user channel atrices are restricted to be diagonal, to the general ultiaccess vector channel odel in (4) where no restrictions are placed on user channel atrices. We note that this channel odel allows also that distinct users transit in distinct subspaces of the receiver signal space, with different diensions and potential overlap aong the, which is different fro the initial fraewor for interference avoidance [3], [4], which assues the sae N-diensional signal space for the receiver and all users. III. GEEDY INTEFEENCE AVOIDANCE FO VECTO CHANNELS Interference avoidance allows users in a CDMA syste to adapt their signatures to achieve better perforance by axiizing signal-to-interference-plus-noise-ratio (SIN) at the receiver. In order to see how interference avoidance can be applied to ultiaccess vector channels we rewrite the received signal in (4) fro the perspective of particular user r = H S b + l=1,l H l S l b l + n } {{ } z where z represents the interference-plus-noise seen by user, and has covariance atrix Z = E[z z ]= H l S l S l H l + W. (6) l=1,l Since Z is syetric it can be diagonalized (5) Z = E E. (7) Furtherore, because Z is a positive definite covariance atrix we define the whitening transforation T = 1/2 E (8) which applied to (5) yields r = T r = T H S b + T z = H S b + w (9) where H = T H is the effective channel atrix seen by user in the new coordinates and w = T z is the equivalent white noise with covariance atrix E[w w ]= T Z T = I equal to the identity atrix. We now apply the singular value decoposition (SVD) [28, p. 442] to the transfored channel atrix corresponding to user H = U D V (10) where atrix U of diension N N has as coluns the eigenvectors of H H,atrixV of diension N N has as coluns the eigenvectors of H H, and atrix D of diension N N contains the singular values of H on the ain diagonal and zero elsewhere. We note that because T is invertible the ran of H will be equal to that of H. Without loss of generality we assue that H has full ran 1 N. Thus, the singular value atrix D can be partitioned as [ ] D D = (11) 0 with D an N N diagonal atrix containing the non-zero singular values along the diagonal and zeros in rest. The left inverse of D is D = [ D 1 0 ] = D D = I N. (12) eturning to equation (9) in which the SVD for transfored channel atrix H has been applied, we have r = U D V S b + w. (13) 1 This is not a restriction, since if H is not full ran then soe diensions of user signal space will have zero projection on the output space. Therefore, we can redefine a reduced codeword atrix S, which uses only diensions with nonzero projections on the output space.

1468 IEEE TANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 8, AUGUST 2007 We pre-ultiply by U r = U r = D V S b + U w (14) and define S = V S and w = U w. Note that because both U and V are unitary atrices they preserve nors of vectors. Thus, coluns of S are also unit nor as were the coluns of S. Also, because the equivalent noise ter w is white, then w will reain white with the sae covariance atrix equal to the identity atrix r = D S b + w. (15) At this point, we pre-ultiply with the left inverse of D to obtain the equivalent received signal fro user s perspective r = D r = S b + z (16) with E[ z z 2 ]= D. The received signal in (16) is processed by a ban of linear filters atched to the transfored codewords S to yield the decision variables for user. Thus, the SIN corresponding to a given sybol of user is expressed in ters of the transfored codeword s () (the th colun of S ) as where γ () = () 1 s () () s() (17) = () s () s() (18) is the autocorrelation atrix of the interference-plus-noise affecting the decision variable for sybol of user, and () = E[ r r ]= S S + D 2 (19) is the autocorrelation atrix of the equivalent received signal in equation (16). Greedy interference avoidance consists of changing s () the transfored codeword of user such that the corresponding SIN in equation (17) is axiized, and is accoplished [3] by replacing s () with the iniu eigenvector of atrix () in (18). In addition to greedy axiization of the SIN corresponding to codeword of user l, this procedure iplies also a onotonic increase in su capacity which for the vector channel in equation (4) is given by C s = 1 2 log 1 log W (20) 2 where is the covariance atrix of the received signal in (4), and is given by = H l S l S l H l + W. (21) l=1 We note that the expression of su capacity in (20) is not achievable with linear receivers, and we use it erely to argue that codeword replaceent based on greedy interference avoidance converges to a fixed point. In order to see this, we note that is directly related to D 2 () = S S + through the whitening transforation T and the unitary transforations iplied by the SVD. Thus,. After codeword re- + x (), where x () + s () placeent this becoes () = () is the iniu eigenvector of () a onotonic increase in () iplies a onotonic increase in, and iplicitly in su capacity. We now loo at () before and after codeword replaceent. Before codeword replaceent we have () = () () + x () x() s() x(), and we need to show that () + s () s(). (22) Using the approach outlined by [29, p. 46, eqs. (I), (II)] for coputing the deterinant of a bloc partitioned atrix, we can write for N N atrix A and N 1 vector y A y y 1 = A + yy =1+y A 1 y (23) and applying the bloc deterinant forula (23) to (22), we can rewrite it as [ 1+ x () ( () ) 1 x () which further reduces to ( () x () ) 1 x () ] [ 1+ s () s () ( () ) 1 s () ] (24) ( ) () 1 s (). (25) When x () is the iniu eigenvector of (), then it is also the axiu eigenvector of ( () ) 1, and properties of the ayleigh quotient [28, pp. 348 349] iply that (25) is true. Thus, (22) is true, and as a consequence, we have that greedy interference avoidance onotonically increases su capacity. We note that, as it is the case with all interference avoidance procedures, no siultaneous updates are allowed and only one codeword update can occur at a given tie. IV. INTEFEENCE AVOIDANCE ALGOITHMS FO MULTIACCESS VECTO CHANNELS Nuerous interference avoidance algoriths can be forulated based on repeated application of the greedy interference avoidance procedure presented in the Section III. These are defined by the various ways in which user codewords are selected for update. For exaple, one algorith could be defined by the update at a given step of one codeword of a given user, followed by update of a randoly selected codeword of a randoly selected user. Alternatively, at a given step of the algorith, one could update the codeword with the lowest SIN over all codewords and users. Or, one could update the codeword, which will yield the axiu increase in su capacity. We note that, regardless of the order in which codewords are selected for update, convergence of all algoriths based on greedy interference avoidance to a fixed point is guaranteed by the onotonic increase in su capacity iplied by greedy interference avoidance, along with the fact that su capacity is an upper bounded easure. We also note that this does not iply that codewords converge to a particular codeword enseble, but rather that repeated application of the greedy interference avoidance procedure converges to a class of codewords, which iply the sae value for su capacity, the so-called convergence in class [4]. To investigate fixed-point properties and illustrate the with

POPESCU et al.: INTEFEENCE AVOIDANCE AND MULTIACCESS VECTO CHANNELS 1469 nuerical exaples, we consider the interference avoidance algorith forally stated here: Greedy Interference Avoidance Algorith for Multiaccess Vector Channels 1) Initialize: user codeword atrices {S l } L l=1, channel atrices {H l } L l=1, and noise covariance atrix W. 2) For each user =1 L a) Apply the whitening transforation in (8) followed by the SVD in (10) to obtain the equivalent proble in (16). b) For each codeword =1,...,M of user. eplace s () by the iniu eigenvector of the corresponding () in (18). c) Update user codeword atrix S = V S. 3) epeat Step 2 until a fixed point is reached. This algorith is different than the one presented in [30] and analyzed in ore detail in [31], which consists of updating all codewords of a given user sequentially until convergence to a fixed point for the given user is reached and then iterating for all users in the syste, as opposed to the greedy interference avoidance algorith in which Step 2 defines an enseble iteration that updates all codewords of all users once. Nuerically, a fixed point of the algorith is defined with respect to a stopping criterion. That is, we say that a fixed point is reached when the difference between two consecutive values of the stopping criterion is within a specified tolerance ɛ. The stopping criterion can be an individual one, lie the codeword SIN or the Euclidean distance between codewords and their corresponding replaceents, or a global one lie su capacity. We note that in the case of individual stopping criteria, all values corresponding to all codewords ust be within the specified tolerance for the algorith to stop. As we have already entioned, convergence of the algorith to a fixed point is guaranteed by the fact that each codeword update onotonically increases su capacity, and that su capacity is upper bounded. However, this does not necessarily iply that the fixed point is unique, and theoretically any fixed points of the algorith are possible. A fixed point is characterized by the fact that any codeword of any user is iniu eigenvector of its corresponding () atrix in (18) as () s() = 1 γ () s (), (26) with γ () being the equilibriu SIN corresponding to codeword of any user. In addition, all codewords of any given user are eigenvectors of (), the autocorrelation atrix of the equivalent received signal in (16), i.e., ( ) () () s = 1 γ () +1 s () =1,...,M. (27) With respect to su capacity, the optial point with axiu su capacity corresponds to siultaneous water filling by all users in their respective signal spaces, provided that users transit covariance atrices are allowed to span the entire transit signal space [26]. In our fraewor, the transit covariance atrix of a given user expressed in ters of its codewords is S S, and siultaneous water filling requires that the nuber of codewords assigned for transission to user l be equal to or larger than the diension of its signal space, i.e., M N. According to [26], siultaneous water filling iplies that the following conditions are satisfied for any user. 1) The transit directions of user align with the rightsingular vectors of its effective channel. 2) The eigenvalues of user transit covariance atrix, and of its corresponding interference-plus-noise covariance atrix satisfy a water filling condition [32, p. 253]. The first condition is always satisfied at a fixed point of the greedy interference avoidance, algorith as user codeword atrix is expressed as S = V S with V containing the right-singular vectors of H. In addition, transfored codewords are eigenvectors of the autocorrelation atrix of user equivalent received signal [3] in (16), and the water-filling condition 2) iplies that they satisfy () () s = c s () =1,...,M (28) where c is the corresponding waterar. Thus, the optial point that corresponds to a su capacity axiizing codeword enseble is also a fixed point of the greedy interference avoidance algorith, and corresponds to the case when all codewords of user have unifor SIN equal to 1/(c 1). We note that the axiu su capacity point can be reached by applying the iterative water-filling algorith [26]. In this case, the distribution of user power over signal space diensions is explicitly optiized, and optial transit covariance atrices are obtained by applying iterative water filling. These can be used to obtain optial codeword ensebles with axiu su capacity by applying codeword construction algoriths at the transitter [13] [15]. However, greedy interference avoidance can yield an optial codeword enseble that axiizes su capacity directly, by distributed codeword adaptation, and in this case, the distribution of user power over signal-space diensions is optiized iplicitly by changing codeword coponents. More precisely, even though all user codewords are constrained to have unit nor, the power that a given user places in signal diension n is given by the su of squares of the nth eleents of all its codewords, i.e. p () n = M =1 s ()2 n n =1,...,N (29) and changes when the user codeword atrix is updated, such that the total user power N P = n=1 p () n = N M n=1 =1 s ()2 n, =1,...,L (30) reains constant. While we have not been able to prove that, in general, the greedy interference avoidance algorith always reaches the optial fixed point that corresponds to an enseble of codewords, which axiizes su capacity, we have perfored extensive siulations that corroborate this fact. To eep results general, we have not restricted siulations to particular odulation and

1470 IEEE TANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 8, AUGUST 2007 Fig. 1. Convergence of su capacity for 100 trials of the greedy interference avoidance algorith for a syste with L =10 users, in a signal space of diension N =15, white noise with unit variance at the base station, and randoly generated channel atrices. Each user has M =15codewords, and one enseble iteration consists of 150 codeword updates. propagation odels, but rather perfored the in the arbitrary signal space with channel atrices generated randoly. We have perfored siulations for both white noise with covariance atrix equal to scaled identity atrix, as well as colored noise with covariance atrix a randoly generated positive definite atrix. Siulations of the greedy interference avoidance algorith for signal-space diensions ranging fro 2 to 100, with different nubers of users and at least as any codewords per user as signal-space diensions (i.e., M l N l, l =1,...,L), indicate that the proposed algorith reaches the optial point corresponding to axiu su capacity fro rando initial codeword ensebles without special assistance, and no suboptial fixed points were observed. That is, the su capacity value at these points is identical to that obtained by applying iterative water-filling [26], and for the resulting codeword ensebles, all the codewords of any given user are eigenvectors of their corresponding () with identical eigenvalues γ /(1 + γ ), where γ is the corresponding SIN. Furtherore, at such fixed points, the reaining eigenvalues of () are saller than γ /(1 + γ ), which shows that a siultaneously water filling solution is satisfied. The siulations have also shown rapid convergence of the algorith when su capacity was used as a global convergence etric, usually within 3 4 enseble iterations, which is siilar to convergence of the iterative water-filling algorith to the axiu su capacity value [26]. This is illustrated in Fig. 1, which is typical for all the siulations. In addition, codeword convergence was observed. That is, siulations have shown that codewords converged to within tight nor difference tolerances Fig. 2. Codeword convergence for 100 trials of the greedy interference avoidance algorith for the sae syste with L =10users, in a signal space of diension N =15, white noise with unit variance at the base station, and randoly generated channel atrices. ( s () (i +1) s () (i) ε) when starting fro different rando initializations. However, codeword convergence was uch slower than convergence in su capacity as can be seen fro Fig. 2 (>40 enseble iterations for ε =10 3 ). We conclude this section by noting that, when users have less codewords than available signal-space diensions (i.e., M l <N l ), the greedy interference avoidance algorith still converges to a fixed point, but whether this fixed point corresponds to axiu su capacity is an open question whose answer is contingent upon solving the ore general proble of axiizing su capacity subject to power and ran constraints iposed on users. We note that when M l <N l, then user l s transission is restricted to a subspace of diension at ost M l, and axiization of su capacity subject to power and ran constraints iposed on users is still an open proble [31], [33]. V. CONCLUSION In this paper we considered a ultiuser counication syste in a general signal-space fraewor with distinct users residing in different possibly overlapping signal spaces, all being subspaces of the coon receiver signal space in which inforation is transitted using ulticode CDMA. The syste is odeled as a ultiaccess vector channel for which interference avoidance is applied to codeword adaptation in a given user s signal space after whitening of the interference-plus-noise seen by the user and projection using the SVD. We showed that application of greedy interference avoidance for any given user/codeword onotonically increases su capacity, and presented an algorith for codeword adaptation based on greedy interference avoidance. We note that while

POPESCU et al.: INTEFEENCE AVOIDANCE AND MULTIACCESS VECTO CHANNELS 1471 suboptial ensebles of codewords are theoretically possible, nuerical experients have shown that these were never obtained when starting fro randoly chosen initial codewords, and the algorith has consistently yielded su capacity axiizing codeword ensebles. This is consistent with siilar observations on related interference avoidance algoriths [1], [3] [5], which converge to codeword ensebles with axiu su capacity fro rando initializations. Convergence of the greedy interference avoidance algorith to axiu su capacity occurs within 3 4 enseble iterations, which is siilar to the iterative water-filling procedure described in [26]. However, interference avoidance algoriths are not substitutes for the iterative water-filling procedure. We note that the iterative water filling algorith perfors explicit optiization of user power over signal-space diensions and yields optial transit covariance atrices, which axiize su capacity, while the greedy interference avoidance algorith optiizes the distribution of user power over signal-space diensions iplicitly by adaptation of user codewords, and yields optial CDMA codeword ensebles that axiize su capacity. We also note that when optial transit covariance atrices are sought, then iterative water filling is the way to go, although when optial enseble of codewords to be used for transission are desired, as it is the case in CDMA systes, application of greedy interference avoidance offers a viable alternative to iterative water filling: convergence to axiu su capacity occurs within the sae nuber of enseble iterations and the greedy interference avoidance algorith yields directly an optial CDMA codeword enseble, while additional procedures ust be applied to obtain such an enseble fro the optial transit covariance atrices yielded by the iterative water filling algorith. ACKNOWLEDGMENT The authors are grateful to Dr.. Schober and the anonyous reviewers for their constructive coents on the paper. EFEENCES [1] S. Uluus and. Yates, Iterative construction of optiu signature sequence sets in synchronous CDMA systes, IEEE Trans. Inf. Theory, vol. 47, no. 5, pp. 1989 1998, Jul. 2001. [2] P. Anigstein and V. Ananthara, Ensuring convergence of the MMSE iteration for interference avoidance to the global optiu, IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 873 885, Apr. 2003. [3] C. ose, S. Uluus, and. Yates, Wireless systes and interference avoidance, IEEE Trans. Wireless Coun., vol. 1, no. 3, pp. 415 428, Jul. 2002. [4] C. ose, CDMA codeword optiization: Interference avoidance and convergence via class warfare, IEEE Trans. Inf. Theory, vol. 47, no. 6, pp. 2368 2382, Sep. 2001. [5] D. C. Popescu and C. ose, Codeword optization for uplin CDMA dispersive channels, IEEE Trans. Wireless Coun.,vol. 4,no.4,pp.1563 1574, Jul. 2005. [6] W. Santipach and M. L. Honig. Signature optiization for CDMA with liited feedbac, IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3475 3492, Oct. 2005. [7] D. J. Love,. W. Heath Jr., W. Santipach, and M. L. Honig, What is the value of liited feedbac for MIMO channels?, IEEE Coun. Mag., vol. 42, no. 10, pp. 54 59, Oct. 2004. [8] C. Lăcătuş and D. C. Popescu. Adaptive interference avoidance for dynaic wireless systes: A Gae-Theoretic Approach, IEEE J. Sel. Topics Signal Process., vol. 1, no. 1, pp. 189 202, Jun. 2007. [9] C. Lăcătuş and D. C. Popescu, Interference avoidance with increental power updates for uplin CDMA systes, in Proc. 2006 IEEE Wireless Coun. Netw. Conf., Las Vegas, NV, Mar. 2006, vol. 4, pp. 1842 1847. [10] J. Singh and C. ose, Distributed increental interference avoidance, in Proc. 2003 IEEE Global Telecoun. Conf., San Francisco, CA, Dec. 2003, vol. 1, pp. 415 419. [11] M. upf and J. Massey, Optiu sequence ultisets for synchronous code-division ultiple-access channels, IEEE Trans. Inf. Theory,vol.40, no. 4, pp. 1226 1266, Jul. 1994. [12] P. Viswanath, V. Ananthara, and D. N. C. Tse, Optial sequences, power control and capacity of spread spectru systes with ultiuser linear receivers, IEEE Trans. Inf. Theory, vol.45,no.6,pp.1968 1983, Sep. 1999. [13] P. Viswanath and V. Ananthara, Optial sequences and su capacity of synchronous CDMA systes, IEEE Trans. Inf. Theory, vol.45, no.6, pp. 1984 1991, Sep. 1999. [14] P. Viswanath and V. Ananthara, Optial sequences for CDMA under colored noise: A Schur Saddle function property, IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1295 1318, Jun. 2002. [15] T. Guess, Optial sequences for CDMA with decision-feedbac receivers, IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 886 900, Apr. 2003. [16] G. N. Karystinos and D. A. Pados, New bounds on the total squared correlation and optiu design of DS-CDMA binary signature sets, IEEE Trans. Coun., vol. 51, no. 1, pp. 48 51, Jan. 2003. [17] G. N. Karystinos and D. A. Pados, The axiu squared correlation, su capacity, and total asyptotic efficiency of iniu total squared correlation binary signature sets, IEEE Trans. Inf. Theory,vol.51,no.1, pp. 351 354, Jan. 2005. [18] J. A. Tropp, I. S. Dhillon, and. W. Heath, Jr., Finite-step algoriths for constructing optial CDMA signature sequences, IEEE Trans. Inf. Theory, vol. 50, no. 11, pp. 2916 2921, Nov. 2004. [19]. W. Heath, Jr., J. A. Tropp, I. Dhillon, and T. Stroher, Construction of equiangular signatures for synchronous CDMA systes, in Proc. 8th IEEE Int. Syp. Spread Spectru Tech. Appl., Sydney, Australia, Aug. 2004, vol. 1, pp. 708 712. [20] W. M. Jang, B.. Vojcic, and. L. Picholtz, Joint transitter-receiver optiization in synchronous ultiuser counications over ultipath channels, IEEE Trans. Coun., vol.46,no.2,pp.269 278,Feb. 1998. [21] A. Scaglione and G. B. Giannais, Design of user codes in QS-CDMA systes for MUI eliination in unnown ultipath, IEEE Coun. Lett., vol. 3, no. 3, pp. 25 27, Feb. 1999. [22] G. S. ajappan and M. L. Honig, Signature sequence adaptation for DS- CDMA with ultipath, IEEE J. Sel. Areas Coun, vol. 20, no. 2, pp. 384 395, Feb. 2002. [23] J. I. Concha and S. Uluus, Optiization of CDMA signature sequences in ultipath channels, in Proc. 53rd IEEE Veh. Technol. Conf., hodes, Greece, May 2001, vol. 3, pp. 1227 1239. [24] G. G. aleigh and J. M. Cioffi, Spatio-teporal coding for wireless counication, IEEE Trans. Coun., vol. 46, no. 3, pp. 357 366, Mar. 1998. [25].S. ChengandS. Verdú, Gaussian ultiacess channels with ISI: Capacity region and ultiuser water-filling, IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 773 785, May 1993. [26] W. Yu, W. hee, S. Boyd, and J. M. Cioffi, Iterative water-filling for Gaussian vector ultiple-access channels, IEEE Trans. Inf. Theory, vol. 50, no. 1, pp. 145 152, Jan. 2004. [27] H. J. Landau and H. O. Pollac, Prolate spheroidal wave functions, fourier analysis and uncertainty III: The diension of the space of essentially tie- and band-liited signals, Bell Syst. Tech. J., vol.41,no.4, pp. 1295 1335, Jul. 1962. [28] G. Strang, Linear Algebra and Its Applications. San Diego, CA: Harcourt Brace Jovanovich, 1988. [29] F.. Gantacher, The Theory of Matrices, vol. 1. New Yor: Chelsea, 1959. [30] D. C. Popescu, O. Popescu, and C. ose, Interference avoidance for ultiaccess vector channels, in Proc. 2002 IEEE Int. Syp. Inf. Theory, Lausanne, Switzerland, Jul 2002, p. 499. [31] D. C. Popescu, O. Popescu, and C. ose, Interference avoidance versus iterative water filling in ultiaccess vector channels, in Proc. 60th IEEE Veh. Technol. Conf., Los Angeles, CA, Sep. 2004, vol. 3, pp. 2058 2062. [32] T. M. Cover and J. A. Thoas, Eleents of Inforation Theory. New Yor, NY: Wiley-Interscience, 1991. [33] W. Yu, Interference avoidance and iterative water filling: A connection, private counication, May 2001.