Next Article in Journal
PRIMAL: Page Rank-Based Indoor Mapping and Localization Using Gene-Sequenced Unlabeled WLAN Received Signal Strength
Previous Article in Journal
ResilientWireless Sensor Networks Using Topology Control: A Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Applications of Decision-Level Data Fusion Techniques in the Field of Multiuser Detection for DS-UWB Systems

1
School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin 150001, China
2
Shanghai Electro-Mechanical Engineering Institute, Shanghai 200245, China
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(10), 24771-24790; https://doi.org/10.3390/s151024771
Submission received: 11 August 2015 / Revised: 17 September 2015 / Accepted: 18 September 2015 / Published: 25 September 2015
(This article belongs to the Section Physical Sensors)

Abstract

:
In this paper, the decision-level data fusion techniques are extended to the multiuser detection (MUD) field. Then two novel MUD algorithms, that is the chairman arbitrating decision-level fusion criterion (CA-DFC) based MUD algorithm and the veto logic decision-level fusion criterion (VL-DFC) based MUD algorithm, are proposed for DS-UWB communication systems. In CA-DFC based method, the chairman can make his arbitration among the preliminary decisions from sub-optimal detectors by his own rule. In the VL-DFC based method, the undetermined bits in these preliminary decisions are considered to construct a simplified solution space, and then the chairman can make his final decision within this space. Simulation results demonstrate that the performances of CA-DFC and VL-DFC based MUD algorithms are superior to those of other sub-optimal MUD algorithms, and even close to that of OMD. Moreover, both of these proposed algorithms have lower computational complexity than OMD, which reveals their efficiency. Compared with CA-DFC, VL-DFC based algorithm achieves a little improvement in its performance, at the cost of the increment in its computational complexity. Thus, they can be applied to different practical situations.

1. Introduction

Data fusion is a significant technique for detection, estimation and decision making. As Joint Directors of Laboratories (JDL) defines [1], data fusion is a “multilevel, multifaceted process handling the automatic detection, association, correlation, estimation, and combination of data and information from several sources”. Hence, its objective is to make the optimal or sub-optimal use of the information generated by multiple knowledge sources and sensors. Now data fusion based systems are widely used in many areas, such as sensor networks, robotics, video and image processing, market planning, data mining, and knowledge discovery applications [2,3,4].
In the present literature, data fusion is usually categorized into three types: data-level, feature-level, and decision-level fusions [5,6]. To take account of the situations constrained on the communication bandwidth or the data storage capacity, the data-level and feature-level fusions may not always be applicable, compared with the decision-level fusion [5]. That is, preliminary decisions should be made at each local detector in order to compress the bits transmitted to the decision fusion center. Then this center will make a global decision based on these local decisions and some fusion criterions. Due to the various types of detector (or classifier, sensor) outputs, decision-level fusion considered in the literature can be divided into three categories [7]: the abstract level, the rank level, and the measurement level. In [8], the authors have classified many typical decision-level fusion methods into these three categories. In detail, the Majority Voting [9], Weighted Majority Voting [10], Behavior Knowledge Space [11], and Naive-Bayes Combination [12] methods are belong to the first category; the Class Set Reduction methods (including intersection of neighborhoods and union of neighborhoods) and the Class Set Reordering methods (including highest rank method, Borda count method and logistic regression method) [13] belong to the second category; the Class-Conscious methods [14] and the Class-Indifferent methods (such as Decision Template combiner [15] and Dempster-shafer combiner [16]) belong to the last category.
On the other hand, ultra-wideband (UWB) technology is attractive for its potential applications in Wireless Personal Area Networks (WPAN) [17,18,19]. It employs the short pulses (with bandwidths of several GHz) to transmit its information symbols at low power [20]. The advantages of UWB also stem from its ultra-wideband nature, such as good information hiding ability and less sensitivity to multipath fading [21,22]. To reinforce its multiple-access (MA) ability in the multiuser occasion, UWB can be combined with traditional spread-spectrum (SS) techniques, which were firstly proposed by Scholtz in [23], and with subsequent analyses in [24,25,26]. Among them, direct sequence UWB (DS-UWB) is an efficient MA scheme [21,27,28], where binary phase-shift keying (BPSK) can be employed and a large number of active users can share the same frequency bandwidth simultaneously, interfering with others [29]. (Please note that, another important spectrum sharing strategy is the cognitive radio technique. However, due to the space limitation, this technique will not be studied in this paper. The interested readers can refer to [30] for more information.) Therefore, the multiple access interference (MAI) exists and conduces to the performance aggravation of the conventional detector (CD) (also called the single-user matched filter). (For this reason, a lot of receiver solutions have been proposed in the literature. In [31], the multiple antenna diversity was employed in single-user UWB systems. In [32], a stop-and-go strategy based on energy detection in CD receiver was applied to alleviate excessive noise collection in single-user UWB clustered multipath channels. In [33], a zonal based Rake receiver was further proposed for multiuser UWB systems.) Besides these, the multiuser detection (MUD) technique that can eliminate or weaken the negative effects of MAI is studied in [34,35,36,37,38,39,40,41,42,43]. Verdu proposed the optimum multiuser detector (OMD) for code division multiple access (CDMA) systems [34], and it can achieve the optimal bit error rate (BER) performance [35] and the perfect near-far effect (NFE) resistant ability [36]. To DS-UWB systems, this OMD method was introduced by Yoon and Kohno [20]. However, the computational complexity of OMD growing exponentially with the number of active users makes it impractical to use [37].
Consequently, in order to make the tradeoff between performance and complexity, various sub-optimal MUD algorithms have been studied in literatures. In [38], a Reduced Complexity Maximum Likelihood (RCML) algorithm was proposed, but its practical use seems still impossible. In [39], a multiuser frequency-domain (FD) turbo detector combing FD turbo equalization schemes with soft interference cancelation was presented, whereas its BER performance is unsatisfactory. A multiuser detection method using a novel genetic algorithm base on complementary error function mutation (CEFM) was discussed for UWB systems in [40] and other swarm intelligence based MUD algorithms were studied in [41,42,43]. However, it is clear that a single multiuser detector cannot always be well suited for a particular occasion, particularly when the multipath or shadow fading happens. In [44,45], distributed signal detection was extended to the multiuser problem, then the jointly optimum criterion and the individually optimum criterion were proposed for cooperating receivers. Essentially, the performance gain obtained by this overall procedure is due to its inherent diversity. However, this distributed MUD scheme is still of high computational complexity, as well as OMD. Besides, more antennas and more communication loads are involved in this procedure.
In this paper, motivated by the concepts of decision-level fusion and distributed signal detection in [41,45], we firstly apply the decision-level fusion techniques into the field of MUD. Then two novel MUD algorithms, that is the chairman arbitrating decision-level fusion criterion (CA-DFC) based MUD algorithm and the veto logic decision-level fusion criterion (VL-DFC) based MUD algorithm, are proposed for DS-UWB systems. In both of these methods, a set of sub-optimal detectors (including the minimum mean square error (MMSE) detector, the decorrelating (DEC) detector and the successive interference cancellation (SIC) detector) are used, and the preliminary decisions from these detectors will be merged together by CA-DFC or VL-DFC in the fusion center. The numerical results demonstrate that these two proposed MUD algorithms both have the much better BER performance and NFE resistant ability than other sub-optimal MUD algorithms, and even close to OMD. Meanwhile, the computational complexity of these novel methods is significantly lower than that of OMD. Compared with CA-DFC, VL-DFC based MUD method can achieve a little superior performance at the expense of its higher complexity. So these two proposed algorithms have their different application ranges.
The remainder of this paper is organized as follows. In Section 2, some typical sub-optimal MUD algorithms are reviewed and the decision-level fusion based MUD system model is constructed for DS-UWB systems. In Section 3, the optimal decision-level fusion criterion (O-DFC) and its simplified form, which is the majority voting decision-level fusion criterion (MV-DFC), are discussed. On the problem analysis of O-DFC and MV-DFC, two novel MUD algorithms based on CA-DFC and VL-DFC are proposed respectively, in Section 4. In Section 5, simulation experiments that compare the performance of different MUD algorithms are made. Conclusions are in Section 6.

2. Problem Statement

2.1. Some Typical MUD Algorithms for DS-UWB Systems

Here, we let a K-user synchronous DS-UWB system under the additive white Gaussian noise (AWGN) channel, which could also be regarded as the results of the processing of rake receivers in the multipath channel. For this reason, we only give the multiuser DS-UWB model in the AWGN case, while it can be generalized to the multipath case easily.
In this multiuser DS-UWB system, each information symbol is spread over multiple pulses using pseudo random sequences (PRS). The BPSK modulation is employed by each user and the transmitted signal of the kth user can be expressed as:
S t r ( k ) ( t ) = j = n = 0 N c 1 b j ( k ) p n ( k ) w t r ( t j T f n T c )
where {bj(k)} is the information symbols of the kth user, {pn(k)} denotes the PRS assigned to the kth user, Tc is the pulse repetition period (namely the chip period), Tf is the time duration of information symbol that satisfies Tf = NcTc, and Nc is the length of PRS. Besides, wtr(t) represents the transmitted pulse waveform that can be characterized as the second derivative of Gaussian pulse [20,21]:
w t r ( t ) = [ 1 4 π ( t τ m ) 2 ] exp [ 2 π ( t τ m ) 2 ]
where τm is the parameter that controls the width of this pulse.
If these K- users are all active, the whole received signal of this system is
r ( t ) = k = 1 K A k S t r ( k ) ( t ) + n ( t )
where Ak is the amplitude of the kth received signal and n(t) represents the received noise modeled as the AWGN, with a normal distribution N(0,σn2).
According to [46], the output of a bank of single-user matched filters (MFs), called a conventional detector (CD), can be expressed in the following matrix and vector forms:
y = R A b + n y
where R denotes the K × K normalized cross-correlation matrix with the i-kth entry ρ i k = 0 T f S t r ( i ) ( t ) S t r ( k ) ( t ) d t , A is a K × K diagonal matrix with the amplitude of the kth user’s received signal {Ak}k=1,2,…,K along the diagonal, b = (b1, b2, …, bK)T is the K × 1 vector containing the transmitted information bits from K users and the superscript “T” denotes a vector transpose operation. In addition, n = (n1, n2, …, nK)T is the K × 1 zero-mean Gaussian random noise vector with n k = 0 T f n ( t ) S t r ( k ) ( t ) d t and its covariance matrix equal to
E [ n b T ] = σ n 2 R
Due to the crude assumption that the MAI can be modeled as a zero-mean Gaussian random variable (called “Gaussian approximation”) for CD [47], its performance and multiuser capacity are limited. To improve this, Verdu proposed the optimum multiuser detection (OMD), which is based on the maximum likelihood (ML) criterion [35]. The objective function of OMD is given as:
b ^ = arg max b { 1 , + 1 } K ( 2 b T A y b T A R A b )
From Equation (6), it is obvious that the selection of this optimal solution b ^ in the K-dimensional Euclidean solution space is generally a Non-deterministic Polynomial (NP) hard problem [37]. That is, the computational complexity of OMD is O (2K), which grows exponentially with the number of active users. For this reason, despite its significant performance and capacity gains over CD, it is useless in practice. As a result, several sub-optimal MUD algorithms have been proposed to make the tradeoff between performance and complexity.
Linear MUD algorithm is one kind of sub-optimal approach, which processes the output of CD through multiplying by a matrix M. For example, in the decorrelating (DEC) detector, its transforming matrix is M = R−1; in the minimum mean square error (MMSE) detector, its transforming matrix is
M = A 1 [ R + σ n 2 A 2 ] 1
Moreover, as the linear detectors, such as CD, DEC, and MMSE detectors, the matrix multiplication is usually followed by a −1/+1 decision module:
b ^ = sgn ( M y )
where b ^ is the preliminary decision vector.
Non-linear MUD algorithm is another kind of sub-optimal approach. For example, in the successive interference cancellation (SIC) detector, the decision of the kth user can be expressed as [46]:
b ^ k = sgn ( y k j = k + 1 K A j ρ j k b ^ j )
where the decision of the ith user, i = k + 1,k + 2, …, K, should be correctly demodulated, otherwise, its performance will be affected drastically. Thus, the order of demodulating users is the key problem for this detector. Here, we order users through Equation (10), which can be estimated easily from the outputs of CD:
E [ ( 0 T r ( t ) S t r ( k ) ( t ) d t ) 2 ] = σ n 2 + A k 2 + j k A j 2 ρ j k 2

2.2. Decision-Level Fusion Based MUD System Model

In this paper, we consider the application of decision-level fusion techniques into the field of MUD. The decision-level fusion based MUD system model is constructed as Figure 1 shows. The characteristics of this scheme contain:
(1)
The outputs of CD y = (y1, y2, …, yK)T are passed to the preliminary sub-optimal detectors, including SIC, DEC, and MMSE detectors;
(2)
The preliminary decisions of SIC, DEC, and MMSE (let X1, X2 and X3) are sent to the fusion center;
(3)
The fusion center consists of two parts: committee and fusion criterions. Depending on different decision-level fusion criterions (DFCs), the committee can make a different final decision b ^ on the basis of these preliminary decisions.
(4)
This scheme is not distributed in fact, for it only needs one antenna to receive signals. Consequently, the computational complexity and apparatus integration are saved.
Figure 1. The structure of decision-level fusion based MUD system model.
Figure 1. The structure of decision-level fusion based MUD system model.
Sensors 15 24771 g001

3. Optimal Decision-Level Fusion Criterion (O-DFC) and Its Simplified Form

Since O-DFC has been discussed in the distributed detection system [48,49] (in Figure 2), here we simply review it and extend it to our decision-level fusion based MUD model (in Figure 1) in Section 3.1. Then the majority voting decision-level fusion criterion (MV-DFC), which is the simplified form of O-DFC, is given in Section 3.2.
Figure 2. Distributed detection system with decision-level fusion center.
Figure 2. Distributed detection system with decision-level fusion center.
Sensors 15 24771 g002

3.1. Optimal Decision-Level Fusion Criterion (O-DFC)

In the distributed detection system as Figure 2 shows, signal processing is accomplished at the sensor and preliminary decisions are transmitted to the data fusion center. Then the global decision will be obtained as the output of this center, based on different DFCs. The optimal DFC (O-DFC) was derived by Chair and Varshney [48]. Here, we review it at first and then extend it to our model in Figure 1.
Assume a binary hypothesis testing problem, with two hypotheses:
{ H 0 :  the signal is absent H 1 :  the signal is present
where the priori probabilities of these hypotheses are P(H0) = P0 and P(H1) = P1. Consider there are n detectors in Figure 2 and the observations of each detector are denoted by yi, i = 1, 2, …, n with the assumption of statistical independence. In addition, the conditional probability density function is p(yi|Hj), i = 1, 2, …, n, j = 0, 1.
As Figure 2 depicts, each detector can make its own decision ui by applying a decision rule gi(yi), i = 1, 2, …, n, where
u i = { 1 , if  H 0  is decided + 1 , if  H 1  is decided
These local preliminary decisions ui will be sent to the decision-level fusion center for the further processing. In general, the global decision is a function of these preliminary decisions as:
u = f ( u 1 , u 2 , , u n )
According to [48], the minimum probability of error criterion can be employed to derive the O-DFC, which can be summarized as:
u = f ( u 1 , u 2 , , u n ) = { + 1 , if  a 0 + i = 1 n a i u i > 0 1 , otherwise
where the weights are given by
a 0 = log P 1 P 0
a i = { log 1 P M i P F i , if  u i = + 1 log 1 P F i P M i , if  u i = 1
where PFi = P(ui = +1|H0) is the false alarm probability and PMi = P(ui = −1|H1) is the miss alarm probability of the ith detector, respectively. For more information of the detailed derivation, interested readers can refer to [48].
In our decision-level fusion based MUD model, however, these two hypotheses should be modified as:
{ H 0 m :  − 1 is transmitted by the  m th user H 1 m :  + 1 is transmitted by the  m th user
As a result, the false alarm probability P _ F i m = P ( u _ i m = + 1 | H _ 0 m ) and the miss alarm probability P _ M i m = P ( u _ i m = 1 | H _ 1 m ) of the ith sub-optimal detector for the mth user are both equal to its bit error rate (BER) Peim, we have that is PFim = PMim = Peim, i = 1, 2, …, n, m = 1, 2, …, K and K is the number of users in this multiuser system. For the equiprobable source assumption, we have a0 = 0. Therefore, the O-DFC in our model can be rewritten by
u m = f ( u 1 m , u 2 m , , u n m ) = { + 1 , if  i = 1 n a i m u i m > 0 1 , otherwise
where um is the final decision for the mth user, uim is the preliminary decision of the ith sub-optimal detector for the mth user, and
a i m = log 1 P e i m P e i m
In particular, for the special case when there are it {n} = 3 detectors, a proposition has been proposed by Chen et al. in [49]. Assuming the BER for the mth user at each detector be Peim, i = 1, 2, 3, this proposition reveals that the BER achieved at the fusion center , which is denoted as Pecm_O, is:
P e c m _ O = min  { P e 0 m , P e 1 m , P e 2 m , P e 3 m }
where Pe0m = Pe1mPe2m + Pe1mPe3m + Pe2mPe3m − 2Pe1mPe2mPe3m. Therefore, from Equation (20), we can see that to achieve the improvement of performance by this fusion scheme, the following condition should be satisfied
P e 0 m < min  { P e 1 m , P e 2 m , P e 3 m }
Otherwise, we should simply choose the detector having the lowest BER for the best performance, which also means that there is no performance gain in the fusion of these three detectors.

3.2. The Simplified form of O-DFC: the Majority Voting Decision-Level Fusion Criterion (MV-DFC)

To render the O-DFC tractable, we make a further assumption that for all sub-optimal detectors, their Peim are all equal to Pem, regardless of the differences between these detectors. That is, aim are all equal to aim in Equation (19). Besides, it is clear that the BER satisfies Pem < 0.5 (otherwise, the communication is meaningless), so that 1 − Pem > Pem and am > 0.
Then we can derive the majority voting DFC, called MV-DFC, as follows:
u m = f ( u 1 m , u 2 m , , u n m ) = { + 1 , if  i = 1 n u i m > 0 1 , otherwise
For this case, the proposition obtained in [49] can be simplified to
P e c m _ M V = min  { P e 0 m , P e m }
where Pe0m = 3Pem2 − 2Pem3. So in order to improve the performance from Pem, the following condition should be satisfied:
P e 0 m < P e m
That is,
3 P e m 2 P e m 2 < 1
here we can get Pem < 0.5 or Pem > 1 from Equation (25). Nevertheless, consider Pem is the BER conditioned on 0 < Pem < 1, the condition 0 < Pem < 0.5 should be satisfied to make an improvement. Obviously, it is quite easy to satisfy this condition in the normal communication systems.

4. Two Improved Decision-Level Fusion Criterions for MUD

4.1. The Problems in O-DFC and MV-DFC

Although two decision-level fusion criterions (O-DFC and MV-DFC) have been analyzed above, their performances are not acceptable in our decision-level fusion based MUD model, due to the following reasons:
(1) The optimal decision-level fusion performance that O-DFC can gain, is conditioned on the assumption that these local detectors are statistically independent with each other; meanwhile, the accurate BER value of each detector should be a priori knowledge. To our knowledge, these two assumed conditions are unsatisfied in fact.
On one hand, in Figure 1, the inputs of these sub-optimal detectors (SIC, DEC and MMSE) are all the outputs of CD. For this reason, their performances have a definite relationship with each other. Further, their correlation degree can be estimated [46] quantitatively:
ρ n = n N f N N f N r + n N f
where n is the total number of sub-optimal detectors, N is the total number of information bits for numerical tests, Nf denotes the number of bits that are detected wrongly by all detectors while Nr is the bits detected correctly by all. Figure 3 depicts the correlation degree ρ3 of SIC, DEC, and MMSE detectors versus Eb/N0, when 10 active users are in this system and 106 information bits are used for this simulation. From this figure, we can see that as the Eb/N0 increases, their correlation degree rises obviously until Eb/N0 = 10 dB (from 0.48 to 0.87), while after that, it fluctuates slightly above 0.9.
Figure 3. The correlation degree of SIC, DEC, and MMSE detectors, when K = 10.
Figure 3. The correlation degree of SIC, DEC, and MMSE detectors, when K = 10.
Sensors 15 24771 g003
On the other hand, since the communication channel is random, we are unlikely to estimate the BER of each detector accurately in practice.
(2) Compared with O-DFC, MV-DFC does not need the accurate estimation of the BER of each detector. Moreover, from Equation (22), only the operation of addition is demanded. However, its defects are also evident: (i) to make a final decision, the number of its sub-optimal detectors should be odd; (ii) the assumption of statistical independence is still necessary; (iii) even though the accurate estimation of BER is not needed, the condition Peim = Pem, i = 1, 2, …, n, should still be satisfied, which is impossible for different sub-optimal detectors in our model.
From all the analysis above, we can conclude that both the O-DFC and the MV-DFC are not acceptable in our decision-level fusion based MUD model, and this will also be authenticated by numerical simulations in Section 5.

4.2. The Chairman Arbitrating Decision-Level Fusion Criterion (CA-DFC)

As Figure 1 shows, the preliminary decisions (let X1, X2, and X3) of SIC, DEC, and MMSE detectors are transmitted to the committee synchronously. Note that it is a feature of the committee that there is a chairman in it, whose role is to evaluate these preliminary decisions and make the global decision [47]. The different ways to acquire this global decision correspond to the different DFCs. So here, we consider a situation where the chairman can make his arbitration among these sub-optimal or preliminary decisions with its own arbitrating rule, to select which one is the best. This method is called the chairman arbitrating DFC (CA-DFC) in this paper and discussed below.
Taking the objective function of OMD in Equation (6) into account, we define an approving degree function for the chairman to make his arbitration:
D i = 2 b T A y X i T A R A X i
where i = 1, 2, …, n. Then the CA-DFC can be derived:
If the term
D j = max i = 1 , 2 , , n D i
satisfies, the preliminary decision Xj is arbitrated as the global decision by the chairman. In our model, n equals 3 for SIC, DEC, and MMSE detectors are employed, and this can be generalized into the case that has more than three detectors without difficulties.
Differing from O-DFC and MV-DFC, this CA-DFC doesn’t require the assumption of statistical independence between these sub-optimal detectors, as well as the accurate BERs of them. Furthermore, it can be speculated that the BER performance of this CA-DFC based MUD method is better than that of any of these sub-optimal detectors, due to the operation of Equation (28). That is, its BER achieves
P e c m _ C A < min  { P e 1 m , P e 2 m , P e 3 m }

4.3. The Veto Logic Decision-Level Fusion Criterion (VL-DFC)

Another DFC introduced into the field of MUD in this paper is the veto logic (called VL-DFC). The veto logic implies that all sub-optimal detectors (all members) have to agree with the final decision that the chairman makes. If anyone of them dissents, the final decision should be abolished.
In this method, the voting bit is defined at first:
u m = f ( u 1 m , u 2 m , , u n m ) = { + 1 , if  i = 1 n u i m = + n 1 , if  i = 1 n u i m = n . × , otherwise
where m = 1, 2, …, K and K is the number of users. Besides, the symbol “×” means this bit cannot be determined between +1 and −1 in this veto logic, while the term i = 1 n u i m = + n (or i = 1 n u i m = n ) means that +1 (or −1) is the unanimous agreement reached by all sub-optimal detectors.
Through Equation (30), the K-dimensional voting vector is U = (u1, u2, …, uK)T, and the number of undetermined bits in it is L (L < K).
It is evident that there are 2L likely solutions that the chairman should make a further decision. Here, we construct a simplified solution space, which consists of all these likely solutions, for the chairman to make his final decision. The approving degree function (Equation (27)) in CA-DFC is also applied to select the best one as the output of VL-DFC.
To summarize, this VL-DFC can be represented by the following steps:
(1)
Calculate the K-dimensional voting vector U by Equation (30);
(2)
Construct a simplified L-dimensional solution space based on U, and L is the number of undetermined bits in U;
(3)
Compare the 2L likely solutions in this space, and consider the solution that has the largest value of Equation (27) as the final decision made by the chairman.
Note that, the CA-DFC is a special case of VL-DFC, for the final decision in CA-DFC is bound to be involved in the simplified solution space of VL-DFC. Consequently, the BER performance of VL-DFC is better than that of CA-DFC, that is, Pecm_VL < Pecm_CA. Whereas, the performance improved by VL-DFC, compared with CA-DFC, is at the cost of its computational complexity increased. The detailed discussion about this is located in the following section.

5. Numerical Results and Analysis

In order to test and analyze these two proposed CA-DFC and VL-DFC based MUD algorithms (hereinafter called CA-DFC and VL-DFC, respectively), Monte Carlo simulations are utilized. As Figure 1 shows, a decision-level fusion based MUD receiver for DS-UWB systems is designed; meanwhile, in our experiments, the fusion center applies four DFCs: O-DFC, MV-DFC, CA-DFC, and VL-DFC. The major parameters used for these simulations are summarized in Table 1.
The performances of CD, SIC, DEC, MMSE, O-DFC, MV-DFC, CA-DFC, VL-DFC, and OMD are compared, including the BER performance versus Eb/N0, the near-far effect (NFE) resistant capability, the BER performance versus the number of users K, and also their BER performance in the indoor multipath environment. Before them, the computational complexity of CA-DFC and VL-DFC is compared with that of OMD to demonstrate their efficiency.
Table 1. Simulation parameters.
Table 1. Simulation parameters.
SystemDS-UWB
Modulation ModeBPSK
Pseudo random sequences (PRS)m sequences
The length of PRS31
Communication channelAWGN or IEEE 802.15.3a (CM2)
The number of testing information symbols105
The width of UWB pulse0.7531 ns
The pulse repetition period≈2 ns
The number of active usersK = 5, 10, 15, 20

5.1. The Computational Complexity Comparison

To compare the computational complexity of CA-DFC and VL-DFC with that of OMD, the total number of calculating the value of the objective function in Equation (6) per K × 1 information bit vector b is considered here (listed in Table 2). As the calculation of this function is not involved in CD, SIC, DEC, MMSE, O-DFC, and MV-DFC, the computational complexity of them is negligible.
Table 2. The computational complexity comparison.
Table 2. The computational complexity comparison.
MUD AlgorithmsCalculation Number
CA-DFCn
VL-DFC2L
OMD2K
In Table 2, we define n is the number of sub-optimal detectors used for fusion, and in this paper, n = 3. Besides, L is the number of undetermined bits in the voting vector, and K denotes the number of active users in this system. It is clear that the value of L has a relationship with K, and in general, the greater K is (and the stronger the MAI is), the greater L is. Therefore, the ratio L/K is adopted and then the computational complexity of VL-DFC and OMD is depicted in Figure 4, conditioned on L/K = 0.1, 0.3, 0.5, respectively.
From the simulation results in Figure 4, we can see that as the number of users increases, the more computational complexity will be saved by VL-DFC, particularly when L/K is smaller than 0.3. In fact, this demand is satisfied as Figure 5 shows, which gives the average L versus Eb/N0 curves conditioned on K = 5, 10, 15 and 20 in AWGN channel. From this figure, three conclusions are obtained as follows: First, as K increases, the average L also increases obviously, which is due to the enhancement of MAI. Second, all the situations (points in this figure) can achieve L/K < 0.3. The last is that, as the Eb/N0 is lower, the average L is greater, which means the solution space constructed in VL-DFC becomes larger for the chairman to make his global decision.
Figure 4. The computational complexity of VL-DFC and OMD.
Figure 4. The computational complexity of VL-DFC and OMD.
Sensors 15 24771 g004
Figure 5. The average L versus Eb/N0 curves when K = 5, 10, 15, and 20 in AWGN channel.
Figure 5. The average L versus Eb/N0 curves when K = 5, 10, 15, and 20 in AWGN channel.
Sensors 15 24771 g005

5.2. The BER Performance versus Eb/N0 Comparison

The BER versus Eb/N0 curves in the AWGN channel are depicted in Figure 6, when the number of users in this system is 10 and the energy per bit of all users is ensured to be equal by perfect power control, that is, Eb1 = Eb2 = … = Eb10.
It can be seen from Figure 6 that the BER performances of these MUD algorithms can be divided into two types: one is the algorithms that the decision-level fusion is not considered, involving CD, SIC, DEC, MMSE, and OMD; the other is the algorithms that the decision-level fusion is considered on the basis of SIC, DEC, and MMSE as Figure 1 shows, involving O-DFC, MV-DFC, CA-DFC, and VL-DFC. In the first type, the BER performance of CD is the worst while that of OMD is the best, which has been demonstrated in the literature. However, due to the assumption of statistical independence between SIC, DEC, and MMSE is not satisfied, the BER performances of O-DFC and MV-DFC are even not better than that of MMSE. On the other hand, CA-DFC and VL-DFC both have much better BER performances than MMSE, O-DFC, and MV-DFC. Besides, compared with CA-DFC, VL-DFC is still a little better, which we have anticipated in Section 4.3.
Figure 6. The BER versus Eb/N0 curves in AWGN channel when K = 10 and perfect power control is employed.
Figure 6. The BER versus Eb/N0 curves in AWGN channel when K = 10 and perfect power control is employed.
Sensors 15 24771 g006
Note that there is still a performance gap between VL-DFC (also CA-DFC) and OMD. To our knowledge, the reason is that in both our proposed methods, the situation when the preliminary detection results of these sub-optimal detectors (here, SIC, DEC, and MMSE) are all wrong is not considered. Since the assumption of statistical independence is not established, the estimation of this probability is out of this paper.

5.3. The NFE Resistant Ability Comparison

The BER performances of these algorithms without power control, named the near-far effect (NFE), are discussed in this simulation. In this DS-UWB system, there are also 10 users and the communication channel is AWGN.
Figure 7 shows the BER performance curves of the first user, when the energy per bit of this user is fixed with its Eb1/N0 equal to 5 dB while that of other nine users Eb2~10/N0 varies from 0 dB to 20 dB synchronously. That is, the ratio Eb2~10/Eb1 changes from −5 dB to 15 dB.
From this figure, we can see that the NFE resistant ability (no sense with Eb2~10/Eb1) of OMD is the best among them. Those of CA-DFC and VL-DFC are evidently much better than those of other sub-optimal detectors, and even close to that of OMD. Moreover, those of O-DFC and MV-DFC are still not better than that of MMSE for the same reason as well as Figure 6 shows.
Furthermore, the BER performance curve of SIC has an inflexion at the point where Eb2~10/Eb1 = 0 dB, due to its detection method in Equations (9) and (10). On one hand, when the energy per bit of users 2~10 calculated by Equation (10) is smaller than that of the first user, that is Eb2~10/N0 < 5 dB and Eb2~10/Eb1 < 0 dB, then the information bits of user1 will be detected at first, the same as CD does. This is the reason the BER performance curve of SIC is identical with CD until Eb2~10/Eb1 = 0 dB. On the other hand, when Eb2~10/N0 > 5 dB and Eb2~10/Eb1 > 0 dB, the information bits of users 2~10 will be detected before those of the first user, with more reliability. Consequently, after the interfering signal subtracted from the original received signal by Equation (9), the BER performance of SIC is improved dramatically.
Figure 7. The BER versus Eb2~10/Eb1 curves in AWGN channel when K = 10 and no power control is employed.
Figure 7. The BER versus Eb2~10/Eb1 curves in AWGN channel when K = 10 and no power control is employed.
Sensors 15 24771 g007

5.4. The BER Performance versus K Comparison

The BER performance curves of these detectors versus the number of active users K are displayed in Figure 8, when the energy per bit of all users is set Eb/N0 = 5 dB. In general, as the number of users increases, the BER performances of all detectors become worse. In detail, OMD has the best capability to resist the effect of the increment of K, while CD has the worst. In addition, we can see that as K increases, the gap between VL-DFC and OMD enlarges. The reason for this phenomenon is that, the more users in this system, the more severely the MAI will be affected. So as K increases, the probability that the preliminary detection results of SIC, DEC, and MMSE are all wrong is bigger, resulting in the enlargement of this gap. But most importantly, the BER performances of CA-DFC and VL-DFC are both much better than other sub-optimal MUD algorithms. The achievement by introducing decision-level fusion techniques into MUD is significant.
Figure 8. The BER versus K curves in AWGN channel when Eb/N0 = 5 dB.
Figure 8. The BER versus K curves in AWGN channel when Eb/N0 = 5 dB.
Sensors 15 24771 g008

5.5. The BER Performance Comparison in Multipath Environment

In order to verify the performances of CA-DFC and VL-DFC based MUD algorithms in the indoor environment, which is the most common situation where UWB technology can be employed, we carry out this experiment. Without loss of generality, the recommended IEEE 802.15.3a CM2 multipath channel [50,51] is used here, and the path with the strongest energy is gathered at the receiver.
The BER performance curves of these MUD algorithms are compared in Figure 9. It is clear that the performances of these two proposed fusion-based algorithms are much better than those of other sub-optimal MUD algorithms, and even close to that of OMD. Taking account of the lower computational complexity they have, we can see that the good tradeoff between performance and complexity is realized by these novel fusion based algorithms.
Figure 9. The BER versus Eb/N0 curves in multipath channel when K = 10.
Figure 9. The BER versus Eb/N0 curves in multipath channel when K = 10.
Sensors 15 24771 g009

6. Conclusions

In this paper, motivated by the concept of data fusion, we have proposed two novel decision-level fusion based MUD algorithms, called the CA-DFC based MUD algorithm and the VL-DFC based MUD algorithm. In the CA-DFC based scheme, the chairman at the fusion center can do his arbitration to select one of the preliminary decisions from sub-optimal MUD algorithms as the output of this scheme; while in the VL-DFC based scheme, the undetermined bits among these preliminary decisions are considered to construct a simplified solution space, and then the chairman should select the best solution within this space as the global decision. Computer simulations show that the BER performance and the NFE resistant ability of these two proposed algorithms are superior to those of other sub-optimal algorithms, and even close to those of OMD. Besides, the computational complexity of them is much lower than that of OMD, which indicates their practical use.

Acknowledgments

First and foremost, I would like to show my deepest gratitude to my supervisor, Zhilu Wu, a respectable, responsible and resourceful scholar, who has provided me with valuable guidance in every stage of the writing of this article. Without his enlightening instruction, impressive kindness and patience, I could not have completed this article. His keen and vigorous academic observation enlightens me not only in this article but also in my future study. I shall extend my thanks to Zhiyuan Zong, Minglei Yang and Zhenguo Shi for all her kindness and help. I would also like to thank all my teachers who have helped me to develop the fundamental and essential academic competence. My sincere appreciation also goes to the teachers and students from Harbin Institute of Technology, who participated this study with great cooperation. Last but not least, I’d like to thank all my friends, especially my lovely roommates, for their encouragement and support.

Author Contributions

Yebo Gu contributed to the conception of the study; Minglei Yang contributed significantly to analysis and manuscript preparation; Zhenguo Shi performed the data analyses and wrote the manuscript; Zhilu Wu helped perform the analysis with constructive discussions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. White, F.E. Data Fusion Lexicon: Data Fusion Subpanel of the Joint Directors of Laboratories Technical Panel for C3; IEEE Trans.: San Diego, CA, USA, 1991. [Google Scholar]
  2. Khaleghi, B.; Khamis, A.; Karray, F.O.; Razavi, S.N. Multisensor data fusion: A review of the state-of-the-art. Inf. Fusion 2013, 14, 28–44. [Google Scholar] [CrossRef]
  3. Saporta, G. Data fusion and data grafting. Comput. Stat. Data Anal. 2002, 38, 465–473. [Google Scholar] [CrossRef]
  4. Cho, S.; Baek, S.; Kim, J.S. Exploring artificial intelligence-based data fusion for conjoint analysis. Expert Syst. Appl. 2003, 24, 287–294. [Google Scholar] [CrossRef]
  5. Dasarathy, B.V. Decision Fusion; IEEE Computer Society Press: Los Alamitos, CA, USA, 1994. [Google Scholar]
  6. Dasarathy, B.V. Decision fusion benefits assessment in a three-sensor suite framework. Opt. Eng. 1998, 37, 354–369. [Google Scholar] [CrossRef]
  7. Mangai, U.G.; Samanta, S.; Das, S.; Chowdhury, P.R. A survey of decision fusion and feature fusion strategies for pattern classification. IETE Tech. Rev. 2010, 27, 293–307. [Google Scholar] [CrossRef]
  8. Xu, L.; Krzyżak, A.; Suen, C.Y. Methods of combining multiple classifiers and their applications to handwriting recognition. IEEE Trans. Syst. Man Cybern. 1992, 22, 418–435. [Google Scholar] [CrossRef]
  9. Kittler, J.; Hatef, M.; Duin, R.P.W.; Matas, J. On combining classifiers. IEEE Trans. Pattern Anal. Mach. Intell. 1998, 20, 226–239. [Google Scholar] [CrossRef]
  10. Littlestone, N.; Warmuth, M.K. The weighted majority algorithm. Inf. Comput. 1994, 108, 212–261. [Google Scholar] [CrossRef]
  11. Huang, Y.S.; Suen, C.Y. A method of combining multiple experts for the recognition of unconstrained handwritten numerals. IEEE Trans. Pattern Anal. Mach. Intell. 1995, 17, 90–94. [Google Scholar] [CrossRef]
  12. Kuncheva, L.I. Combining Pattern Classifiers: Methods and Algorithms; John Wiley & Sons: Hoboken, NJ, USA, 2004. [Google Scholar]
  13. Ho, T.K.; Hull, J.J.; Srihari, S.N. Decision combination in multiple classifier systems. IEEE Trans. Pattern Anal. Mach. Intell. 1994, 16, 66–75. [Google Scholar]
  14. Lam, L.; Suen, C.Y. Optimal combinations of pattern classifiers. Pattern Recognit. Lett. 1995, 16, 945–954. [Google Scholar] [CrossRef]
  15. Kuncheva, L.I.; Bezdek, J.C.; Duin, R.P.W. Decision templates for multiple classifier fusion: An experimental comparison. Pattern Recognit. 2001, 34, 299–314. [Google Scholar] [CrossRef]
  16. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976. [Google Scholar]
  17. Liu, K.H.; Cai, L.; Shen, X.S. Exclusive-region based scheduling algorithms for UWB WPAN. IEEE Trans. Wirel. Commun. 2008, 7, 933–942. [Google Scholar]
  18. Li, Z.P.; Kuo, G.S. Layered MAC for high-rate UWB WPAN system. In Proceedings of the IEEE 64th Vehicular Technology Conference, Melbourne, Australia, 7–10 May 2006.
  19. Aripin, N.M.; Fisal, N. Analysis of channel time allocations for MPEG-4 video transmission over UWB WPAN. In Proceedings of the IEEE Symposium on Industrial Electronics & Applications, (ISIEA 2009), Kuala Lumpur, Malaysia, 4–6 October 2009; Volume 2, pp. 705–710.
  20. Yoon, Y.C.; Kohno, R. Optimum multi-user detection in ultra-wideband (UWB) multiple-access communication systems. In Proceedings of the IEEE International Conference on Communications, New York, NY, USA; 2002. [Google Scholar]
  21. Tan, S.S.; Nallanathan, A.; Kannan, B. Performance of DS-UWB multiple-access systems with diversity reception in dense multipath environments. IEEE Trans. Veh. Technol. 2006, 55, 1269–1280. [Google Scholar] [CrossRef]
  22. Sato, H.; Ohtsuki, T. Frequency domain channel estimation and equalisation for direct sequence-ultra wideband (DS-UWB) system. IEE Proc. Commun. 2006, 153, 93–98. [Google Scholar] [CrossRef]
  23. Scholtz, R. Multiple access with time-hopping impulse modulation. In Proceedings of the IEEE MILCOM’93, Boston, MA, USA, 11–14 October 1993; Volume 2, pp. 447–450.
  24. Win, M.Z.; Scholtz, R.A. Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for wireless multiple-access communications. IEEE Trans. Commun. 2000, 48, 679–689. [Google Scholar] [CrossRef]
  25. Somayazulu, V.S. Multiple access performance in UWB systems using time hopping vs. direct sequence spreading. In Proceedings of the 2002 IEEE Wireless Communications and Networking Conference, Orlando, FL, USA, 17–21 March 2002; Volume 2, pp. 522–525.
  26. Guo, Z.; Letaief, K. An effective multiuser receiver for DS/CDMA systems. IEEE J. Sel. Areas Commun. 2001, 19, 1019–1028. [Google Scholar]
  27. De Rango, F.; Veltri, F.; Fazio, P.; Marano, S. BER regression analysis of DS-UWB based WPAN. In Proceedings of the IEEE 65th Vehicular Technology Conference, Dublin, Ireland, 22–25 April 2007; pp. 2286–2290.
  28. Boubaker, N.; Letaief, K.B. Performance analysis of DS-UWB multiple access under imperfect power control. IEEE Trans. Commun. 2004, 52, 1459–1463. [Google Scholar] [CrossRef]
  29. Verdú, S. Optimum multiuser asymptotic efficiency. IEEE Trans. Commun. 1986, 34, 890–897. [Google Scholar] [CrossRef]
  30. Giorgetti, A.; Varrella, M.; Chiani, M. Analysis and performance comparison of different cognitive radio algorithms. In Proceedings of the Second International Workshop on Cognitive Radio and Advanced Spectrum Management, Aalborg, Denmark, 18–20 May 2009; pp. 127–131.
  31. D’Errico, R.; Sibille, A.; Giorgetti, A.; Chiani, M. Antenna diversity in UWB indoor channel. In Proceedings of the IEEE International Conference on Ultra-Wideband, Hannover, Germany, 10–12 September 2008.
  32. Decarli, N.; Giorgetti, A.; Dardari, D.; Chiani, M.; Win, M.Z. Stop-and-go receivers for non-coherent impulse communications. IEEE Trans. Wirel. Commun. 2014, 13, 4821–4835. [Google Scholar] [CrossRef]
  33. Shao, H.; Beaulieu, N.C. A novel zonal UWB receiver with superior performance. IEEE Trans. Commun. 2009, 57, 1197–1206. [Google Scholar] [CrossRef]
  34. Verdu, S. Minimum probability of error for asynchronous Gaussian multiple-access channels. IEEE Trans. Inf. Theory 1986, 32, 85–96. [Google Scholar] [CrossRef]
  35. Lupas, R.; Verd, S. Near-far resistance of multiuser detectors in asynchronous channels. IEEE Trans. Commun. 1990, 38, 496–508. [Google Scholar] [CrossRef]
  36. Verdu, S. Computational complexity of optimum multiuser detection. Algorithmica 1989, 4, 303–312. [Google Scholar] [CrossRef]
  37. Alagöz, F. A new algorithm for optimum multiuser detection in synchronous CDMA systems. AEU-Int. J. Electron. Commun. 2003, 57, 263–269. [Google Scholar] [CrossRef]
  38. Kaligineedi, P.; Bhargava, V.K. Frequency-domain turbo equalization and multiuser detection for DS-UWB systems. IEEE Trans. Wirel. Commun. 2008, 7, 3280–3284. [Google Scholar] [CrossRef]
  39. Li, Q.; Kong, Z.; Fang, Y.; Yao, J.; Wang, C. Multiuser detection employing a novel Genetic algorithm for UWB communications. Proc. Eng. 2011, 15, 2505–2510. [Google Scholar]
  40. Zhao, N.; Wu, Z.; Zhao, Y.; Quan, T. A population declining mutated ant colony optimization multiuser detector for MC-CDMA. IEEE Commun. Lett. 2010, 14, 497–499. [Google Scholar] [CrossRef]
  41. Liu, H.; Li, J. A particle swarm optimization-based multiuser detection for receive-diversity-aided STBC systems. IEEE Signal Process. Lett. 2008, 15, 29–32. [Google Scholar]
  42. Wu, Z.; Zong, Z.; Yin, Z.; Chen, X. Joint multiuser detection of CD and AFSA in DS-UWB communication systems. Inf. Technol. J. 2011, 10, 422–427. [Google Scholar] [CrossRef]
  43. Hu, J.; Blum, R.S. Application of distributed signal detection to multiuser communication systems. IEEE Trans. Aerosp. Electron. Syst. 2002, 38, 1220–1229. [Google Scholar]
  44. Blum, R.S.; Hu, J. Distributed multiuser detection. In Proceedings of the Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 24–27 October 1999.
  45. Verdu, S. Multiuser Detection; Cambridge University Press: Cambridge, UK, 1998. [Google Scholar]
  46. Durisi, G.; Benedetto, S. Performance evaluation of TH-PPM UWB systems in the presence of multiuser interference. IEEE Commun. Lett. 2003, 7, 224–226. [Google Scholar] [CrossRef]
  47. Chair, Z.; Varshney, P.K. Optimal data fusion in multiple sensor detection systems. IEEE Trans. Aerosp. Electron. Syst. 1986, AES-22, 98–101. [Google Scholar] [CrossRef]
  48. Chen, J.G.; Ansari, N.; Sivesk, Z. Improving multiuser detection performance by data fusion. In Proceedings of the Global Telecommunications Conference, London, UK, 18–22 November 1996; Volume 3, pp. 1794–1798.
  49. Goebel, K.; Yan, W.; Cheetham, W. A method to calculate classifier correlation for decision fusion. In Proceedings of the Decision and Control, Las Vegas, NV, USA, December 2002; pp. 135–140.
  50. Abou-Rjeily, C. Performance analysis of UWB systems over the IEEE 802.15. 3a channel model. IEEE Trans. Commun. 2011, 59, 2377–2382. [Google Scholar] [CrossRef]
  51. Hao, K.; Gubner, J. Theoretical performance analysis of the IEEE 802.15. 3a UWB channel model. In Proceedings of the IEEE Global Telecommunications Conference, Washington, DC, USA, 26–30 November 2007; pp. 1770–1774.

Share and Cite

MDPI and ACS Style

Gu, Y.; Yang, M.; Shi, Z.; Wu, Z. The Applications of Decision-Level Data Fusion Techniques in the Field of Multiuser Detection for DS-UWB Systems. Sensors 2015, 15, 24771-24790. https://doi.org/10.3390/s151024771

AMA Style

Gu Y, Yang M, Shi Z, Wu Z. The Applications of Decision-Level Data Fusion Techniques in the Field of Multiuser Detection for DS-UWB Systems. Sensors. 2015; 15(10):24771-24790. https://doi.org/10.3390/s151024771

Chicago/Turabian Style

Gu, Yebo, Minglei Yang, Zhenguo Shi, and Zhilu Wu. 2015. "The Applications of Decision-Level Data Fusion Techniques in the Field of Multiuser Detection for DS-UWB Systems" Sensors 15, no. 10: 24771-24790. https://doi.org/10.3390/s151024771

Article Metrics

Back to TopTop