SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013
pp. 123–131, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3413
ADAPTIVE BLIND MULTIUSER
DETECTION UNDER IMPULSIVE NOISE
USING PRINCIPAL COMPONENTS
R. Nirmala Devi1
and K.Kishan Rao2
1
Asooc .Prof., Department of Elelctronics and Instrumentation, Kakatiya
Institute of Technology And Science Warangal, Andhrapradesh, India
2
Director Vagdevi Group of Institutions, Bollikunta Warangal, Andhrapradesh,
India
ABSTRACT
In this paper we consider blind signal detection for an asynchronous code division multiple
access (CDMA) system with Principal component analysis (PCA) in impulsive noise. The blind
multiuser detector requires no training sequences compared with the conventional multiuser
detection receiver. The proposed PCA blind multiuser detector is robust when compared
with knowledge based signature waveforms and the timing of the user of interest. PCA is
a statistical method for reducing the dimension of data set, spectral decomposition of the
covariance matrix of the dataset i.e first and second order statistics are estimated.
Principal component analysis makes no assumption on the independence of the data vectors
PCA searches for linear combinations with the largest variances and when several linear
combinations are needed, it considers variances in decreasing order of importance. PCA
improves SNR of signals used for differential side channel analysis. In different to other
approaches, the linear minimum mean-square-error (MMSE) detector is obtained blindly; the
detector does not use any training sequence like in subspace methods to detect multi user
receiver. The algorithm need not estimate the subspace rank in order to reduce the
computational complexity. Simulation results show that the new algorithm offers substantial
performance gains over the traditional subspace methods.
KEYWORDS
Blind Multiuser Detection, Code Division Multiple Access, Inter Symbol Inter-ference (ISI).
Multiple Access Interference (MAI). Principal component analysis (PCA)
1. INTRODUCTION
In DS-CDMA detector uses one user detection strategy in which each user is taken as a signal,
while the other users are considered as noise. In recent years, multiuser detection has attracted
significant interest due to enhancement of performance it offers in communication schemes with
present multiple access interference (MAI) [1]. Blind multiuser detection is effective for reducing
inter symbol interference (ISI) and improving system throughput. Among all blind methods the
124 Computer Science & Information Technology (CS & IT)
subspace method (SS) [2] is known for its better performance. However, the batch algorithm [2]
requires singular value decomposition (SVD), which is inconvenient for adaptive implementation.
Further, it requires accurate rank estimation of the correlation matrix, which is not easy in an
inherently noisy environment [4]-[9].
All the subbspace tracking algorithms were found with computational complexity around
2
( )O m ,
or where d is the dimension of the signal subspace, in each recursion [3]. However, the
total computation of the blind channel identification is still due to the second step, i.e.,
using the estimated subspace vectors to optimize channel estimation. The second step cannot be
repeatedly implemented with reduced computations in an obvious manner[11]. Least square(LS)
method is a simple way to estimate a Channel ,it’s efficiency is not significant . Principal
component analysis does not assume on the independence of the data vectors. When many
combinations are required PCA identifies linear combinations with the largest variances , it
considers variances in decreasing order of importance. In PCA signal to noise ratio of signals
used for differential side channel analysis is improved. By applying PCA to the frequency
spectrum noise and signals can be separated.
These detectors employ the PCA algorithm [9] at the outputs of a bank of matched filters. Main
purpose is to retrive the original sequence from the received signal that is corrupted by other
users and MAI, without the help of training sequences and a priori knowledge of the channel.
The paper is organized as follows :Section 2 describes the System model followed by section 3
with the description of the algorithm used. In section 4 contains results and conclusions.
2. SYSTEM MODELLING
Consider a DS-CDMA channel operating with coherent binary phase shift keying (BPSK)
modulation format with L users sharing the same bandwidth. If L users are active, the received
base band, continuous-time signal is a superposition of all L signals[4],
∞≤≤−∞+= ttztXty ),()()( (1)
where X(t) is the useful signal comprised of the data signals of L active users and z(t) the additive
white Gaussian noise. The useful signal X(t) is taken as the expression
)()()(
1
01
ll
M
i
l
L
l
l iTtxibwtX τ−−= ∑∑
−
== (2)
where M stands for the number of data symbols per user in the data frame of interest, T is the
symbol interval, wl is the received signal amplitude, lτ is the delay, }1,.....,1,0,)({ −= Miibl is the
symbol stream, and )(txl , { }Tt0txl ≤≤);(
is the normalized signaling waveform of the lth user. It
is assumed that the signaling interval of each user is T seconds, and the input alphabet is
antipodal binary: ]1,1[ +− . Further, direct-sequence spread-spectrum (DS-SS) multiple access
signatures may be written as a succession of the chip pulses as
( )O md
3
( )O m
Computer Science & Information Technology (CS & IT) 125
],0[),()(
1
0
TtjTtptx c
N
j
l
jl ∈−= ∑
−
=
ϕ
(3)
where N is the processing gain, ( )l
N
ll
ppp 110 ,..., − is the signature sequence of s1′± assigned to the lth
user, and ϕ is the normalized chip waveform of duration cT
, with TNTc =
.
A. Synchronous Case
For the synchronous case (i.e., 0....21 ==== lτττ ) of model (1), to demodulate the i th symbols
of the L users, { }L
ll ib 1
)( = , it is sufficient to consider the received signal during the i th signaling
interval, i.e.,
])1(,[),()()()(
1
TiiTttziTtxibwty ll
L
l
l +∈+−= ∑= (4)
Near the receiver, y(t) is the received signal it is filtered by a chip-matched filter and then
sampled at the chip rate. The resulting discrete-time signal sample corresponding to the j th chip
of the i th symbol is given by
dtjTiTttyiy
c
c
TjiT
jTiT
cj )()()(
)1(
∫
++
+
−−= ϕ
(or)
)()(
1
izxibw l
l
jl
L
l
l += ∑= (5)
(6)
where is the normalized signature sequence of the l th
user, and is the channel ambient noise sample vector at the i th symbol
interval. The term
{ })(iz j
is assumed as a sequence of independent and identically distributed
(i.i.d.) random variables with a non Gaussian distribution. In this paper, the pdf of impulsive
noise model is modeled as commonly used two-term Gaussian mixture model for the additive
noise samples,{ })(iz j
, which has the form
(7)
with , 10 ≤≤ ε , and 1≥κ . term represents the nominal background noise and the
term represents an impulsive component, with ε representing the probability of
1
( ) ( ) ( )
L
l l l
l
i w b i i
=
= +∑y x z
0 1 1 0 1 1
1
, ,..., , ,..,
T Tl l l l l l
l N Nx x x p p p
N
− −
   = =   x
[ ]0 1 1( ) ( ), ( ),..., ( )
T
Ni z i z i z i−=z
2 2
(1 ) (0, ) (0, )f v vε ϖ εϖ κ= − +
0v >
2
(0, )vϖ
2
(0, )vϖ κ
126 Computer Science & Information Technology (CS & IT)
occurrence of impulses. This model serves as an approximation to the more fundamental
Middleton Class A noise model and also has been used extensively to model physical noise
arising in radio and acoustic channels [4,10, 11].
B. Extension to Asynchronous Case
This algorithm is applicable for the users when they are symbol and chip asynchronous. After
some algebra, asynchronous signal model given in (1) can be written as [5]
(8)
where
(9)
where Hm denotes the )1( +× MLNM Hermitian cross correlation matrix of the composite
waveforms associated with the symbols in b and the matrices and are defined as
(10)
with
(11)
and . The parameter m is called the smoothing factor and is chosen such
that the Sylvester matrix has full column rank. If the signature waveforms of all users as well
as the relative delays are known to the receiver, then the Sylvester matrix can be constructed.
Here, using PCA, principal components are calculated for received ym (i) as in eq(4)
The output matrix is is found as the covariance matrix
( ) ( ) ( )m m m m mi i i= +y Η W b z
( 1)
(1) (0) ...
: ... ... :
: ... ... :
... (1) (0)
m
Nm L m× +
 
 
 ≅
 
 
 
H H 0
H
0 H H
(0)H (1)H
[ ]1
(0)
...
(1)
L
 
≅ 
 
H
h h
H
1
1
(1 )
l l
l l
m m
l l l l l
N m N m
π π
+
− − −
   
   
≅ − +   
   
   
0 0
h x x
0 0
&l l
l l l
c c
m m
T T
τ τ
π
 
= = − 
 
mH
mH
Computer Science & Information Technology (CS & IT) 127
(1) (2) .... ( )
(0) (1) .... ( 1)
( 1) (0) .... ( 2)
(1)
y y y t
y y y t
y
y y y t
y
 
 − =
 − −
 
 M M O
(12)
C = Covariance(y) (13)
T
C U V= Σ (14)
3. PRINCIPAL COMPONENT ANALYSIS ALGORITHM
PCA is a technique which is generally used for reducing the dimensionality of multivariate data
sets i.e. reducing the number of dimensions, without much loss of information .The covariance
matrix of n random variables x is Σ, the principal components are defined as
z = Ax
Where A is n by n orthogonal matrix with rows of that are eigen vectors of covariance matrix as
the rows of z is the vector of n principal components (PCs) . The Eigen values of Σ are
proportional to the fraction of the total variance accounted for by the corresponding eigenvectors,
so the PCs explaining most of the variance in the original variables can be identified. Regularly
some of the original variables are correlated like a small group of the PCs describes a large space
of the variance of the main data.
The data matrix X of size m x n is considered as received signal.
1 1 1 1( ) [ ( ), ( ), ( ), ( )]X t x t x t x t x t= KK (15)
is the time ordered collection of a single matrix to which PCA can be applied. The means of the
xi are removed and the covariance matrix computed by
1 T
X X
n
 ∑ =   (16)
∑ is an m x m square matrix, Eigen values, and corresponding eigenvectors will be calculated,
First eigenvectors are calculated from the covariance matrix, second step is to arrange them by
Eigen values in descending order .This gives you the components in order of significance. The
lesser Eigen values are ignored there by reducing the data. Principal components are ordered
eigenvectors of the covariance matrix. The PCs were obtained using
zj=aj x j=1,2, …….n
The PCs are a linear transformation with transformation coefficients given by the eigenvectors .
PCA is solved by using covariance matrix and singular value decomposition (SVD) methods.
128 Computer Science & Information Technology (CS & IT)
Let X be an arbitrary n × m matrix and
T
X X . be a rank r, square, symmetric m × m matrix.
1 2 3
ˆ ˆ ˆ ˆ{ , , ...... }rv v v v is the set of orthonormal m×1 eigenvectors with associated eigenvalues for
1 2 3{ , , ,...... }rλ λ λ λ the symmetric matrix
T
X X .
ˆ ˆ( )T
i i iX X v vλ= (17)
i iσ λ=
are positive, real and named as the singular values
1 2 3
ˆ ˆ ˆ ˆ{ , , ...... }ru u u u is the group of n×1 vectors defined by
[ ]1ˆ ˆi i
i
u X v
σ=
1
ˆ ˆ
0
i j
i j
u u
i j
=
=
≠ Eigenvectors are orthonormal. (18)
ˆi iX v σ=
The scalar expansion of SVD is
ˆ ˆi i iX v uσ=
X multiplied by an eigenvector of
T
X X .is equal to a scalar times another vector. The set of
eigenvectors 1 2 3
ˆ ˆ ˆ ˆ{ , , ...... }rv v v v and the set of vectors are 1 2 3
ˆ ˆ ˆ ˆ{ , , ...... }ru u u u both orthonormal sets
and bases in r dimensional space.
1 0
0 0
γ
σ
σ
 
 
 ∑ =
 
  
 
%
K
O
M M
L (19)
1 2 3 γσ σ σ σ≥ ≥ ≥ %K
are the rank-ordered set of singular values. Likewise we construct
accompanying orthogonal matrices,
[ ]1 2 3
ˆ ˆ ˆ ˆ, , ...... rV v v v v=
(20)
[ ]1 2 3
ˆ ˆ ˆ ˆ, , ...... rU u u u u=
(21)
Matrix expansion of SVD
XV U= ∑ (22)
Computer Science & Information Technology (CS & IT) 129
where each column of V and U perform the scalar version of the decomposition (Equation 3).
Because V is orthogonal, we can multiply both sides by V−1 = ்ܸ
to arrive at the final form of
the decomposition.
T
XV U V= ∑
Implementation of PCA is as follows
The description of PCA using the covariance method is as follows:
The purpose is to transform one data set X of dimension M to an another data set Y of smaller
dimension L.
Step 1: Get some data and organize the data set.
Step 2: Subtract the mean:
For better performance of PCA , subtract the mean from each of the data dimensions.
The mean subtracted is equal to the average across each dimension.
Step 3: Calculate the covariance matrix.
Step 4: Calculate the eigenvectors and Eigen values of the covariance matrix.
Step 5: Choosing components and forming a feature vector:
The eigenvector containing the maximum Eigen value is considered as the principle
component of the data set.
Feature Vector = (eig1, eig2, eig3, eig4,………………, eign) .
Step 6: Deriving the new data set:
4. EXPERIMENTAL RESULTS
In simulations, first a synchronous system with 6 users is considered. The spreading sequence of
each user with length 31 is considered (as shown in the following experiments). Figure 1(a-f)
shows the bit error rate and signal to noise ratio comparisions for 6 different users which are
estimated using corresponding principal componets. And the received users powers are all equal
for the considered detectors (i.e., in the case of tight power control). The noise distribution
parameters for are fixed as and , respectively. These plots demonstrate the
performance gains achieved by the robust blind multiuser detector with PCA in impulsive noise.
Next, an asynchronous system with 6 users and the noise distribution parameters ε =0.01 & 0.1
and 100=κ are considered. The delays of the 6 users are randomly generated. Fig 1( a-f) show
the transmitter and estimated symbols for user 1.and Fig 2 show the BER for 6 different users
with different Principal compon. Fig 3. Shows the details of transmitted and received symbols
for of user one. Fig 4 gives the details of proposed method and subspace method. It is observed
from these plots that the robust blind multiuser detector with the proposed PCA technique
outperforms the traditional subspace method based linear MMSE detector in impulsive noise.
The performance gain increases as the SNR increased.
0.01&0.1ε = 100κ =
130 Computer Science & Information Technology (CS & IT)
(a) (b)
(c) (d)
(e) (f)
Fig 1. BER and SNR Plots for different users using first 6 Principal Components
Fig 2 BER for 6 different users with different Principal components
-10 -5 0 5 10 15
10
-3
10
-2
10
-1
10
0
SNR
BER
-10 -8 -6 -4 -2 0 2 4 6 8 10
10
-2
10
-1
10
0
SNR
BER
-10 -5 0 5 10 15
10
-3
10
-2
10
-1
10
0
SNR
BER
user1
user2
user3
user4
user5
user6
-10 -5 0 5 10 15
10
-3
10
-2
10
-1
10
0
SNR
BER
-10 -5 0 5 10 15
10
-3
10
-2
10
-1
10
0
SNR
BER
-10 -5 0 5 10 15
10
-3
10
-2
10
-1
10
0
SNR
BER
-10 -8 -6 -4 -2 0 2 4 6 8 10
10
-2
10
-1
10
0
SNR
BER
Computer Science & Information Technology (CS & IT) 131
Fig 3. Transmitted and received symbols for user 1
5. CONCLUSIONS
In this paper, Multiuser detection has been done using principal components in asynchronous
non-Gaussian channels is proposed and analyzed. Even the process of computing principal
components is complex, simulation results show that the robust blind multiuser detector with the
proposed PCA technique outperforms the traditional subspace method based linear MMSE
detector in both synchronous and asynchronous CDMA non-Gaussian channels.
REFERENCES
[1] S. Verdu, Multiuser Detection, Cambridge University Press, Cambridge, 1998.
[2] E. Moulines, P. Duhamel, J. Cardoso, and S. Mayrargue, “Subspace Methods for the Blind
Identification Multichannel FIR filters,” IEEE Trans. on Signal Processing, vol. 43, pp. 516-525, Feb
1995.
[3] B.Yang, “Projection Approximation Subspace Tracking,” IEEE Trans. on Signal Processing, vol. 43,
pp. 95-107, Jan 1995.
[4] T.AnilKumar and K.DeerghaRao, “ Improved Robust Technique for Multiuser Detection in Non-
Guassian Channels”, Circuits Systems and Signal Processing,vol 25,No 4,2006.
[5] X.Wang and H.V.Poor, “Robust Multiuser Detection in Non-Guassian Channels”, IEEE Trans. On
Signal Processing, vol. 47, pp. 289-305,Feb,1999.
[6] G.W.Stewart, “An Updating Algorithm for Subspace Tracking”, IEEE Trans. On Signal Processing,
vol. 40., pp. 1535-1541, June 1992
[7] U. Madhow and M.L. Honig. MMSE Interference Suppression for Direct-Sequence Spread-Spectrum
CDMA. IEEE Trans. Communications, Vol. 42, No. 12, pp. 3188-3188, Dec. 1994.
[8] J.B. Schodorf and D.B. Williams. Array Processing Techniques for Multiuser Detection. IEEE Trans.
Communications, Vol. 45, No. 11, pp. 1375 -1378, November 1997.
[9] M. Aminghafari, N. cheze, J.M Poggi,”Multivariate denoisious using wavlets and principal
component Analysis,” computational statistics & Data Analsis, vol. 50 pp. 2381-2398, 2006
[10] ROBUST MIMO-CDMA DECORRELATING DETECTOR Hasan Abuhilal, Aykut Ho-canin and
Huseyin Bilgekul Department of Electrical and Electronic Engineering Eastern Mediterranean
University, Gazimagosa, via Mersin 10, Turkey
[11] R.Nirmaladevi,T.Anilkumar,K.K.Rao” Improved adaptive algorithm for blind multiuser detection in
non gaussian noise” ISPPA2010Kuala Lumpur, Malaysia, 10-13 May, 2010. IEEE , ISBN 978-1-
4244-7165-2, 270-273
-2 -1 0 1 2
-2
0
2
Transmitted Symbols of User 1
Real
Imag
-10 -5 0 5 10
-10
0
10
Received Noisy Signals
Real
Imag
-4 -2 0 2 4
-5
0
5
Equalized symbols of User 1
Real
Imag
-2 -1 0 1 2
-2
0
2
Scaled Equalized Symbols
Real
Imag

Más contenido relacionado

La actualidad más candente

Performance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum SensingPerformance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum SensingPolytechnique Montreal
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...Alexander Decker
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsIDES Editor
 
Methodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesMethodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesijsc
 
Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...
Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...
Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...CSCJournals
 
Performance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal ApproximationPerformance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal Approximationiosrjce
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...IJERA Editor
 
MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION
MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION
MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION ijscai
 
A Comparative Study of DOA Estimation Algorithms with Application to Tracking...
A Comparative Study of DOA Estimation Algorithms with Application to Tracking...A Comparative Study of DOA Estimation Algorithms with Application to Tracking...
A Comparative Study of DOA Estimation Algorithms with Application to Tracking...sipij
 
Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach IJEEE
 
Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...TELKOMNIKA JOURNAL
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemCSCJournals
 
An efficient approach to wavelet image Denoising
An efficient approach to wavelet image DenoisingAn efficient approach to wavelet image Denoising
An efficient approach to wavelet image Denoisingijcsit
 

La actualidad más candente (16)

L010628894
L010628894L010628894
L010628894
 
Performance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum SensingPerformance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum Sensing
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
 
Self-organizing map
Self-organizing mapSelf-organizing map
Self-organizing map
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband Signals
 
Methodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesMethodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniques
 
Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...
Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...
Noisy Speech Enhancement Using Soft Thresholding on Selected Intrinsic Mode F...
 
Performance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal ApproximationPerformance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal Approximation
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
 
MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION
MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION
MARGINAL PERCEPTRON FOR NON-LINEAR AND MULTI CLASS CLASSIFICATION
 
A Comparative Study of DOA Estimation Algorithms with Application to Tracking...
A Comparative Study of DOA Estimation Algorithms with Application to Tracking...A Comparative Study of DOA Estimation Algorithms with Application to Tracking...
A Comparative Study of DOA Estimation Algorithms with Application to Tracking...
 
Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach
 
Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
 
Nc2421532161
Nc2421532161Nc2421532161
Nc2421532161
 
An efficient approach to wavelet image Denoising
An efficient approach to wavelet image DenoisingAn efficient approach to wavelet image Denoising
An efficient approach to wavelet image Denoising
 

Destacado

Java script正则
Java script正则Java script正则
Java script正则fangdeng
 
Creating Mashup service in Yamaguchi
Creating Mashup service in YamaguchiCreating Mashup service in Yamaguchi
Creating Mashup service in YamaguchiOhishi Mikage
 
Virtual tour value proposition (1)
Virtual tour   value proposition (1)Virtual tour   value proposition (1)
Virtual tour value proposition (1)zoultrex
 
Medienübergreifende Repositorien - mehr als nur Dokumentenserver
Medienübergreifende Repositorien - mehr als nur DokumentenserverMedienübergreifende Repositorien - mehr als nur Dokumentenserver
Medienübergreifende Repositorien - mehr als nur DokumentenserverRalf Claußnitzer
 
Nosh presentation
Nosh presentationNosh presentation
Nosh presentationTodd McVey
 
An approach for software effort estimation using fuzzy numbers and genetic al...
An approach for software effort estimation using fuzzy numbers and genetic al...An approach for software effort estimation using fuzzy numbers and genetic al...
An approach for software effort estimation using fuzzy numbers and genetic al...csandit
 
Jagdamba dobhal teach uttarakhand
Jagdamba dobhal teach uttarakhandJagdamba dobhal teach uttarakhand
Jagdamba dobhal teach uttarakhandunitechy
 
Mobile Luxury Masterclass SEO
Mobile Luxury Masterclass SEO Mobile Luxury Masterclass SEO
Mobile Luxury Masterclass SEO 90 Digital
 
превмед форсат флот2013
превмед форсат флот2013превмед форсат флот2013
превмед форсат флот2013asi_mp
 
Kelly Lynn Clark[1]
Kelly Lynn Clark[1]Kelly Lynn Clark[1]
Kelly Lynn Clark[1]Kelly Clark
 
хөрсний морфологи сэдэв 2
хөрсний морфологи сэдэв 2хөрсний морфологи сэдэв 2
хөрсний морфологи сэдэв 2otgooPhh
 
ใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4page
ใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4pageใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4page
ใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4pagePrachoom Rangkasikorn
 
Combined feature extraction techniques and naive bayes classifier for speech ...
Combined feature extraction techniques and naive bayes classifier for speech ...Combined feature extraction techniques and naive bayes classifier for speech ...
Combined feature extraction techniques and naive bayes classifier for speech ...csandit
 
Analytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion miningAnalytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion miningcsandit
 
Grupo Reifs: La depresión en las personas mayores
Grupo Reifs: La depresión en las personas mayoresGrupo Reifs: La depresión en las personas mayores
Grupo Reifs: La depresión en las personas mayoresgruporeifs
 
городские пространства форсайт флот2013
городские пространства форсайт флот2013городские пространства форсайт флот2013
городские пространства форсайт флот2013asi_mp
 
Rx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonan
Rx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonanRx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonan
Rx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonanOPUNITE
 

Destacado (20)

Java script正则
Java script正则Java script正则
Java script正则
 
Creating Mashup service in Yamaguchi
Creating Mashup service in YamaguchiCreating Mashup service in Yamaguchi
Creating Mashup service in Yamaguchi
 
Ch3 ppt
Ch3 pptCh3 ppt
Ch3 ppt
 
Virtual tour value proposition (1)
Virtual tour   value proposition (1)Virtual tour   value proposition (1)
Virtual tour value proposition (1)
 
Medienübergreifende Repositorien - mehr als nur Dokumentenserver
Medienübergreifende Repositorien - mehr als nur DokumentenserverMedienübergreifende Repositorien - mehr als nur Dokumentenserver
Medienübergreifende Repositorien - mehr als nur Dokumentenserver
 
Nosh presentation
Nosh presentationNosh presentation
Nosh presentation
 
An approach for software effort estimation using fuzzy numbers and genetic al...
An approach for software effort estimation using fuzzy numbers and genetic al...An approach for software effort estimation using fuzzy numbers and genetic al...
An approach for software effort estimation using fuzzy numbers and genetic al...
 
Jagdamba dobhal teach uttarakhand
Jagdamba dobhal teach uttarakhandJagdamba dobhal teach uttarakhand
Jagdamba dobhal teach uttarakhand
 
Mobile Luxury Masterclass SEO
Mobile Luxury Masterclass SEO Mobile Luxury Masterclass SEO
Mobile Luxury Masterclass SEO
 
превмед форсат флот2013
превмед форсат флот2013превмед форсат флот2013
превмед форсат флот2013
 
As tics
As ticsAs tics
As tics
 
Kelly Lynn Clark[1]
Kelly Lynn Clark[1]Kelly Lynn Clark[1]
Kelly Lynn Clark[1]
 
Sinónimos y antónimos
Sinónimos y antónimosSinónimos y antónimos
Sinónimos y antónimos
 
хөрсний морфологи сэдэв 2
хөрсний морфологи сэдэв 2хөрсний морфологи сэдэв 2
хөрсний морфологи сэдэв 2
 
ใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4page
ใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4pageใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4page
ใบความรู้+ประโยชน์ของหิน+ป.6+294+dltvscip6+54sc p06 f21-4page
 
Combined feature extraction techniques and naive bayes classifier for speech ...
Combined feature extraction techniques and naive bayes classifier for speech ...Combined feature extraction techniques and naive bayes classifier for speech ...
Combined feature extraction techniques and naive bayes classifier for speech ...
 
Analytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion miningAnalytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion mining
 
Grupo Reifs: La depresión en las personas mayores
Grupo Reifs: La depresión en las personas mayoresGrupo Reifs: La depresión en las personas mayores
Grupo Reifs: La depresión en las personas mayores
 
городские пространства форсайт флот2013
городские пространства форсайт флот2013городские пространства форсайт флот2013
городские пространства форсайт флот2013
 
Rx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonan
Rx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonanRx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonan
Rx15 clinical tues_1115_1_porathwaller-robeson_2fan-lewis-noonan
 

Similar a Adaptive Blind Multiuser Detection Under Impulsive Noise Using PCA

Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...ijcnac
 
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...csandit
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...ijwmn
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
 
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...IJECEIAES
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEIOSR Journals
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEIOSR Journals
 
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...ijwmn
 
IRJET- Performance Evaluation of DOA Estimation using MUSIC and Beamformi...
IRJET-  	  Performance Evaluation of DOA Estimation using MUSIC and Beamformi...IRJET-  	  Performance Evaluation of DOA Estimation using MUSIC and Beamformi...
IRJET- Performance Evaluation of DOA Estimation using MUSIC and Beamformi...IRJET Journal
 
Method for Converter Synchronization with RF Injection
Method for Converter Synchronization with RF InjectionMethod for Converter Synchronization with RF Injection
Method for Converter Synchronization with RF InjectionCSCJournals
 
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...IJERA Editor
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
 
Baseband transmission
Baseband transmissionBaseband transmission
Baseband transmissionPunk Pankaj
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns basedVLSICS Design
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfYAAKOVSOLOMON1
 
IRJET- Reconstruction of Sparse Signals(Speech) Using Compressive Sensing
IRJET- Reconstruction of Sparse Signals(Speech) Using Compressive SensingIRJET- Reconstruction of Sparse Signals(Speech) Using Compressive Sensing
IRJET- Reconstruction of Sparse Signals(Speech) Using Compressive SensingIRJET Journal
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
 
Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...Made Artha
 
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAPerformance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAidescitation
 

Similar a Adaptive Blind Multiuser Detection Under Impulsive Noise Using PCA (20)

Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
 
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
 
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
 
IRJET- Performance Evaluation of DOA Estimation using MUSIC and Beamformi...
IRJET-  	  Performance Evaluation of DOA Estimation using MUSIC and Beamformi...IRJET-  	  Performance Evaluation of DOA Estimation using MUSIC and Beamformi...
IRJET- Performance Evaluation of DOA Estimation using MUSIC and Beamformi...
 
Method for Converter Synchronization with RF Injection
Method for Converter Synchronization with RF InjectionMethod for Converter Synchronization with RF Injection
Method for Converter Synchronization with RF Injection
 
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
 
Baseband transmission
Baseband transmissionBaseband transmission
Baseband transmission
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns based
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdf
 
Dq24746750
Dq24746750Dq24746750
Dq24746750
 
IRJET- Reconstruction of Sparse Signals(Speech) Using Compressive Sensing
IRJET- Reconstruction of Sparse Signals(Speech) Using Compressive SensingIRJET- Reconstruction of Sparse Signals(Speech) Using Compressive Sensing
IRJET- Reconstruction of Sparse Signals(Speech) Using Compressive Sensing
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...
 
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAPerformance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
 

Último

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Adaptive Blind Multiuser Detection Under Impulsive Noise Using PCA

  • 1. Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013 pp. 123–131, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3413 ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMPONENTS R. Nirmala Devi1 and K.Kishan Rao2 1 Asooc .Prof., Department of Elelctronics and Instrumentation, Kakatiya Institute of Technology And Science Warangal, Andhrapradesh, India 2 Director Vagdevi Group of Institutions, Bollikunta Warangal, Andhrapradesh, India ABSTRACT In this paper we consider blind signal detection for an asynchronous code division multiple access (CDMA) system with Principal component analysis (PCA) in impulsive noise. The blind multiuser detector requires no training sequences compared with the conventional multiuser detection receiver. The proposed PCA blind multiuser detector is robust when compared with knowledge based signature waveforms and the timing of the user of interest. PCA is a statistical method for reducing the dimension of data set, spectral decomposition of the covariance matrix of the dataset i.e first and second order statistics are estimated. Principal component analysis makes no assumption on the independence of the data vectors PCA searches for linear combinations with the largest variances and when several linear combinations are needed, it considers variances in decreasing order of importance. PCA improves SNR of signals used for differential side channel analysis. In different to other approaches, the linear minimum mean-square-error (MMSE) detector is obtained blindly; the detector does not use any training sequence like in subspace methods to detect multi user receiver. The algorithm need not estimate the subspace rank in order to reduce the computational complexity. Simulation results show that the new algorithm offers substantial performance gains over the traditional subspace methods. KEYWORDS Blind Multiuser Detection, Code Division Multiple Access, Inter Symbol Inter-ference (ISI). Multiple Access Interference (MAI). Principal component analysis (PCA) 1. INTRODUCTION In DS-CDMA detector uses one user detection strategy in which each user is taken as a signal, while the other users are considered as noise. In recent years, multiuser detection has attracted significant interest due to enhancement of performance it offers in communication schemes with present multiple access interference (MAI) [1]. Blind multiuser detection is effective for reducing inter symbol interference (ISI) and improving system throughput. Among all blind methods the
  • 2. 124 Computer Science & Information Technology (CS & IT) subspace method (SS) [2] is known for its better performance. However, the batch algorithm [2] requires singular value decomposition (SVD), which is inconvenient for adaptive implementation. Further, it requires accurate rank estimation of the correlation matrix, which is not easy in an inherently noisy environment [4]-[9]. All the subbspace tracking algorithms were found with computational complexity around 2 ( )O m , or where d is the dimension of the signal subspace, in each recursion [3]. However, the total computation of the blind channel identification is still due to the second step, i.e., using the estimated subspace vectors to optimize channel estimation. The second step cannot be repeatedly implemented with reduced computations in an obvious manner[11]. Least square(LS) method is a simple way to estimate a Channel ,it’s efficiency is not significant . Principal component analysis does not assume on the independence of the data vectors. When many combinations are required PCA identifies linear combinations with the largest variances , it considers variances in decreasing order of importance. In PCA signal to noise ratio of signals used for differential side channel analysis is improved. By applying PCA to the frequency spectrum noise and signals can be separated. These detectors employ the PCA algorithm [9] at the outputs of a bank of matched filters. Main purpose is to retrive the original sequence from the received signal that is corrupted by other users and MAI, without the help of training sequences and a priori knowledge of the channel. The paper is organized as follows :Section 2 describes the System model followed by section 3 with the description of the algorithm used. In section 4 contains results and conclusions. 2. SYSTEM MODELLING Consider a DS-CDMA channel operating with coherent binary phase shift keying (BPSK) modulation format with L users sharing the same bandwidth. If L users are active, the received base band, continuous-time signal is a superposition of all L signals[4], ∞≤≤−∞+= ttztXty ),()()( (1) where X(t) is the useful signal comprised of the data signals of L active users and z(t) the additive white Gaussian noise. The useful signal X(t) is taken as the expression )()()( 1 01 ll M i l L l l iTtxibwtX τ−−= ∑∑ − == (2) where M stands for the number of data symbols per user in the data frame of interest, T is the symbol interval, wl is the received signal amplitude, lτ is the delay, }1,.....,1,0,)({ −= Miibl is the symbol stream, and )(txl , { }Tt0txl ≤≤);( is the normalized signaling waveform of the lth user. It is assumed that the signaling interval of each user is T seconds, and the input alphabet is antipodal binary: ]1,1[ +− . Further, direct-sequence spread-spectrum (DS-SS) multiple access signatures may be written as a succession of the chip pulses as ( )O md 3 ( )O m
  • 3. Computer Science & Information Technology (CS & IT) 125 ],0[),()( 1 0 TtjTtptx c N j l jl ∈−= ∑ − = ϕ (3) where N is the processing gain, ( )l N ll ppp 110 ,..., − is the signature sequence of s1′± assigned to the lth user, and ϕ is the normalized chip waveform of duration cT , with TNTc = . A. Synchronous Case For the synchronous case (i.e., 0....21 ==== lτττ ) of model (1), to demodulate the i th symbols of the L users, { }L ll ib 1 )( = , it is sufficient to consider the received signal during the i th signaling interval, i.e., ])1(,[),()()()( 1 TiiTttziTtxibwty ll L l l +∈+−= ∑= (4) Near the receiver, y(t) is the received signal it is filtered by a chip-matched filter and then sampled at the chip rate. The resulting discrete-time signal sample corresponding to the j th chip of the i th symbol is given by dtjTiTttyiy c c TjiT jTiT cj )()()( )1( ∫ ++ + −−= ϕ (or) )()( 1 izxibw l l jl L l l += ∑= (5) (6) where is the normalized signature sequence of the l th user, and is the channel ambient noise sample vector at the i th symbol interval. The term { })(iz j is assumed as a sequence of independent and identically distributed (i.i.d.) random variables with a non Gaussian distribution. In this paper, the pdf of impulsive noise model is modeled as commonly used two-term Gaussian mixture model for the additive noise samples,{ })(iz j , which has the form (7) with , 10 ≤≤ ε , and 1≥κ . term represents the nominal background noise and the term represents an impulsive component, with ε representing the probability of 1 ( ) ( ) ( ) L l l l l i w b i i = = +∑y x z 0 1 1 0 1 1 1 , ,..., , ,.., T Tl l l l l l l N Nx x x p p p N − −    = =   x [ ]0 1 1( ) ( ), ( ),..., ( ) T Ni z i z i z i−=z 2 2 (1 ) (0, ) (0, )f v vε ϖ εϖ κ= − + 0v > 2 (0, )vϖ 2 (0, )vϖ κ
  • 4. 126 Computer Science & Information Technology (CS & IT) occurrence of impulses. This model serves as an approximation to the more fundamental Middleton Class A noise model and also has been used extensively to model physical noise arising in radio and acoustic channels [4,10, 11]. B. Extension to Asynchronous Case This algorithm is applicable for the users when they are symbol and chip asynchronous. After some algebra, asynchronous signal model given in (1) can be written as [5] (8) where (9) where Hm denotes the )1( +× MLNM Hermitian cross correlation matrix of the composite waveforms associated with the symbols in b and the matrices and are defined as (10) with (11) and . The parameter m is called the smoothing factor and is chosen such that the Sylvester matrix has full column rank. If the signature waveforms of all users as well as the relative delays are known to the receiver, then the Sylvester matrix can be constructed. Here, using PCA, principal components are calculated for received ym (i) as in eq(4) The output matrix is is found as the covariance matrix ( ) ( ) ( )m m m m mi i i= +y Η W b z ( 1) (1) (0) ... : ... ... : : ... ... : ... (1) (0) m Nm L m× +      ≅       H H 0 H 0 H H (0)H (1)H [ ]1 (0) ... (1) L   ≅    H h h H 1 1 (1 ) l l l l m m l l l l l N m N m π π + − − −         ≅ − +            0 0 h x x 0 0 &l l l l l c c m m T T τ τ π   = = −    mH mH
  • 5. Computer Science & Information Technology (CS & IT) 127 (1) (2) .... ( ) (0) (1) .... ( 1) ( 1) (0) .... ( 2) (1) y y y t y y y t y y y y t y    − =  − −    M M O (12) C = Covariance(y) (13) T C U V= Σ (14) 3. PRINCIPAL COMPONENT ANALYSIS ALGORITHM PCA is a technique which is generally used for reducing the dimensionality of multivariate data sets i.e. reducing the number of dimensions, without much loss of information .The covariance matrix of n random variables x is Σ, the principal components are defined as z = Ax Where A is n by n orthogonal matrix with rows of that are eigen vectors of covariance matrix as the rows of z is the vector of n principal components (PCs) . The Eigen values of Σ are proportional to the fraction of the total variance accounted for by the corresponding eigenvectors, so the PCs explaining most of the variance in the original variables can be identified. Regularly some of the original variables are correlated like a small group of the PCs describes a large space of the variance of the main data. The data matrix X of size m x n is considered as received signal. 1 1 1 1( ) [ ( ), ( ), ( ), ( )]X t x t x t x t x t= KK (15) is the time ordered collection of a single matrix to which PCA can be applied. The means of the xi are removed and the covariance matrix computed by 1 T X X n  ∑ =   (16) ∑ is an m x m square matrix, Eigen values, and corresponding eigenvectors will be calculated, First eigenvectors are calculated from the covariance matrix, second step is to arrange them by Eigen values in descending order .This gives you the components in order of significance. The lesser Eigen values are ignored there by reducing the data. Principal components are ordered eigenvectors of the covariance matrix. The PCs were obtained using zj=aj x j=1,2, …….n The PCs are a linear transformation with transformation coefficients given by the eigenvectors . PCA is solved by using covariance matrix and singular value decomposition (SVD) methods.
  • 6. 128 Computer Science & Information Technology (CS & IT) Let X be an arbitrary n × m matrix and T X X . be a rank r, square, symmetric m × m matrix. 1 2 3 ˆ ˆ ˆ ˆ{ , , ...... }rv v v v is the set of orthonormal m×1 eigenvectors with associated eigenvalues for 1 2 3{ , , ,...... }rλ λ λ λ the symmetric matrix T X X . ˆ ˆ( )T i i iX X v vλ= (17) i iσ λ= are positive, real and named as the singular values 1 2 3 ˆ ˆ ˆ ˆ{ , , ...... }ru u u u is the group of n×1 vectors defined by [ ]1ˆ ˆi i i u X v σ= 1 ˆ ˆ 0 i j i j u u i j = = ≠ Eigenvectors are orthonormal. (18) ˆi iX v σ= The scalar expansion of SVD is ˆ ˆi i iX v uσ= X multiplied by an eigenvector of T X X .is equal to a scalar times another vector. The set of eigenvectors 1 2 3 ˆ ˆ ˆ ˆ{ , , ...... }rv v v v and the set of vectors are 1 2 3 ˆ ˆ ˆ ˆ{ , , ...... }ru u u u both orthonormal sets and bases in r dimensional space. 1 0 0 0 γ σ σ      ∑ =        % K O M M L (19) 1 2 3 γσ σ σ σ≥ ≥ ≥ %K are the rank-ordered set of singular values. Likewise we construct accompanying orthogonal matrices, [ ]1 2 3 ˆ ˆ ˆ ˆ, , ...... rV v v v v= (20) [ ]1 2 3 ˆ ˆ ˆ ˆ, , ...... rU u u u u= (21) Matrix expansion of SVD XV U= ∑ (22)
  • 7. Computer Science & Information Technology (CS & IT) 129 where each column of V and U perform the scalar version of the decomposition (Equation 3). Because V is orthogonal, we can multiply both sides by V−1 = ்ܸ to arrive at the final form of the decomposition. T XV U V= ∑ Implementation of PCA is as follows The description of PCA using the covariance method is as follows: The purpose is to transform one data set X of dimension M to an another data set Y of smaller dimension L. Step 1: Get some data and organize the data set. Step 2: Subtract the mean: For better performance of PCA , subtract the mean from each of the data dimensions. The mean subtracted is equal to the average across each dimension. Step 3: Calculate the covariance matrix. Step 4: Calculate the eigenvectors and Eigen values of the covariance matrix. Step 5: Choosing components and forming a feature vector: The eigenvector containing the maximum Eigen value is considered as the principle component of the data set. Feature Vector = (eig1, eig2, eig3, eig4,………………, eign) . Step 6: Deriving the new data set: 4. EXPERIMENTAL RESULTS In simulations, first a synchronous system with 6 users is considered. The spreading sequence of each user with length 31 is considered (as shown in the following experiments). Figure 1(a-f) shows the bit error rate and signal to noise ratio comparisions for 6 different users which are estimated using corresponding principal componets. And the received users powers are all equal for the considered detectors (i.e., in the case of tight power control). The noise distribution parameters for are fixed as and , respectively. These plots demonstrate the performance gains achieved by the robust blind multiuser detector with PCA in impulsive noise. Next, an asynchronous system with 6 users and the noise distribution parameters ε =0.01 & 0.1 and 100=κ are considered. The delays of the 6 users are randomly generated. Fig 1( a-f) show the transmitter and estimated symbols for user 1.and Fig 2 show the BER for 6 different users with different Principal compon. Fig 3. Shows the details of transmitted and received symbols for of user one. Fig 4 gives the details of proposed method and subspace method. It is observed from these plots that the robust blind multiuser detector with the proposed PCA technique outperforms the traditional subspace method based linear MMSE detector in impulsive noise. The performance gain increases as the SNR increased. 0.01&0.1ε = 100κ =
  • 8. 130 Computer Science & Information Technology (CS & IT) (a) (b) (c) (d) (e) (f) Fig 1. BER and SNR Plots for different users using first 6 Principal Components Fig 2 BER for 6 different users with different Principal components -10 -5 0 5 10 15 10 -3 10 -2 10 -1 10 0 SNR BER -10 -8 -6 -4 -2 0 2 4 6 8 10 10 -2 10 -1 10 0 SNR BER -10 -5 0 5 10 15 10 -3 10 -2 10 -1 10 0 SNR BER user1 user2 user3 user4 user5 user6 -10 -5 0 5 10 15 10 -3 10 -2 10 -1 10 0 SNR BER -10 -5 0 5 10 15 10 -3 10 -2 10 -1 10 0 SNR BER -10 -5 0 5 10 15 10 -3 10 -2 10 -1 10 0 SNR BER -10 -8 -6 -4 -2 0 2 4 6 8 10 10 -2 10 -1 10 0 SNR BER
  • 9. Computer Science & Information Technology (CS & IT) 131 Fig 3. Transmitted and received symbols for user 1 5. CONCLUSIONS In this paper, Multiuser detection has been done using principal components in asynchronous non-Gaussian channels is proposed and analyzed. Even the process of computing principal components is complex, simulation results show that the robust blind multiuser detector with the proposed PCA technique outperforms the traditional subspace method based linear MMSE detector in both synchronous and asynchronous CDMA non-Gaussian channels. REFERENCES [1] S. Verdu, Multiuser Detection, Cambridge University Press, Cambridge, 1998. [2] E. Moulines, P. Duhamel, J. Cardoso, and S. Mayrargue, “Subspace Methods for the Blind Identification Multichannel FIR filters,” IEEE Trans. on Signal Processing, vol. 43, pp. 516-525, Feb 1995. [3] B.Yang, “Projection Approximation Subspace Tracking,” IEEE Trans. on Signal Processing, vol. 43, pp. 95-107, Jan 1995. [4] T.AnilKumar and K.DeerghaRao, “ Improved Robust Technique for Multiuser Detection in Non- Guassian Channels”, Circuits Systems and Signal Processing,vol 25,No 4,2006. [5] X.Wang and H.V.Poor, “Robust Multiuser Detection in Non-Guassian Channels”, IEEE Trans. On Signal Processing, vol. 47, pp. 289-305,Feb,1999. [6] G.W.Stewart, “An Updating Algorithm for Subspace Tracking”, IEEE Trans. On Signal Processing, vol. 40., pp. 1535-1541, June 1992 [7] U. Madhow and M.L. Honig. MMSE Interference Suppression for Direct-Sequence Spread-Spectrum CDMA. IEEE Trans. Communications, Vol. 42, No. 12, pp. 3188-3188, Dec. 1994. [8] J.B. Schodorf and D.B. Williams. Array Processing Techniques for Multiuser Detection. IEEE Trans. Communications, Vol. 45, No. 11, pp. 1375 -1378, November 1997. [9] M. Aminghafari, N. cheze, J.M Poggi,”Multivariate denoisious using wavlets and principal component Analysis,” computational statistics & Data Analsis, vol. 50 pp. 2381-2398, 2006 [10] ROBUST MIMO-CDMA DECORRELATING DETECTOR Hasan Abuhilal, Aykut Ho-canin and Huseyin Bilgekul Department of Electrical and Electronic Engineering Eastern Mediterranean University, Gazimagosa, via Mersin 10, Turkey [11] R.Nirmaladevi,T.Anilkumar,K.K.Rao” Improved adaptive algorithm for blind multiuser detection in non gaussian noise” ISPPA2010Kuala Lumpur, Malaysia, 10-13 May, 2010. IEEE , ISBN 978-1- 4244-7165-2, 270-273 -2 -1 0 1 2 -2 0 2 Transmitted Symbols of User 1 Real Imag -10 -5 0 5 10 -10 0 10 Received Noisy Signals Real Imag -4 -2 0 2 4 -5 0 5 Equalized symbols of User 1 Real Imag -2 -1 0 1 2 -2 0 2 Scaled Equalized Symbols Real Imag