In order to enhance the bandwidth utilization, new advanced receivers for next generation mobile communications are developed. Adaptive blind multiuser detection has been widely proposed for applications in CDMA (Code Division Multiple Access) wireless communication systems for its principal advantage of eliminating training sequence to set-up receiver filter coefficients. Main drawback of this technique is that it reaches the optimum behavior after a certain number of bit times, which precludes its use in typical time-varying environments. In this paper, a new neural network approach is proposed in order to solve this drawback. In particular, this paper considers the use of a modified Kennedy-Chua neural network, based on the Hopfield model. Numerical results are given to demonstrate the effectiveness of the proposed approach in different time-varying application scenarios.
Multiuser interference mitigation in multipath fading channels using a neural network based blind receiver / R. Fantacci; L. Mancini; D. Tarchi. - STAMPA. - 1:(2002), pp. 488-492. (Intervento presentato al convegno IEEE Globecom '02).
Multiuser interference mitigation in multipath fading channels using a neural network based blind receiver
R. Fantacci;L. Mancini;D. Tarchi
2002
Abstract
In order to enhance the bandwidth utilization, new advanced receivers for next generation mobile communications are developed. Adaptive blind multiuser detection has been widely proposed for applications in CDMA (Code Division Multiple Access) wireless communication systems for its principal advantage of eliminating training sequence to set-up receiver filter coefficients. Main drawback of this technique is that it reaches the optimum behavior after a certain number of bit times, which precludes its use in typical time-varying environments. In this paper, a new neural network approach is proposed in order to solve this drawback. In particular, this paper considers the use of a modified Kennedy-Chua neural network, based on the Hopfield model. Numerical results are given to demonstrate the effectiveness of the proposed approach in different time-varying application scenarios.I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.