By Topic

Interference exploitation using adaptive code allocation for the downlink of precoded multiple carrier code division multiple access systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $33
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
C. Masouros ; School of Electrical and Electronic Engineering, The University of Manchester ; E. Alsusa

A novel transmitter code optimisation technique based on adaptive code-to-user allocation is presented for interference exploitation on the time division duplex downlink of binary phase shift keying-based multiple carrier code division multiple access systems. The principle of the proposed technique is to exploit the dependency of multiple access interference on the instantaneous symbol values of the active users. The objective is to adaptively allocate the available spreading sequences to users on a symbol-by-symbol basis to enhance the ratio between constructive and destructive interference and thus optimise the decision variables at the downlink receivers. The resulting signal-to-interference plus noise improvement happens by making use of the energy inherent in the system so the performance benefit is attained with no additional power-per-user investment. It will be shown that when this optimisation technique is incorporated with common pre- and post-equalisation schemes, a significant bit error rate performance improvement is achieved while the associated adaptation overhead is kept less than 6% of the available bandwidth.

Published in:

IET Communications  (Volume:2 ,  Issue: 9 )