9

A novel low complexity multiuser detector based on modi ed

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Scientia Iranica D (2013) 20(6), 2015{2023

Sharif University of TechnologyScientia Iranica

Transactions D: Computer Science & Engineering and Electrical Engineeringwww.scientiairanica.com

A novel low complexity multiuser detector based onmodi�ed genetic algorithm in direct sequence-codedivision multiple access communication systems

A. Zahedia;�, H. Bakhshib, S. Jafaric, H.R. Abdolmohammadid and M.R. Rajatie

a. Department of Electrical Engineering, Science and Research Branch, Islamic Azad University, Hesarak, Tehran, P.O. Box14778-93855, Iran.

b. Department of Electrical Engineering, Shahed University, Persian Gulf Freeway, Tehran, P.O. Box 33191-18651, Iran.c. Department of Biomedical Engineering, Amirkabir University of Technology, Tehran, P.O. Box 15875-4413, Iran.d. Department of Electrical Engineering, Iran University of Science & Technology, Tehran, P.O. Box 16846-13114, Iran.e. Institute of Signal and Image Processing, Department of Electrical Engineering, University of Southern California, Los Angeles,

CA 90089, USA.

Received 20 June 2012; received in revised form 14 November 2012; accepted 21 January 2013

KEYWORDSDirect Sequence-CodeDivision MultipleAccess (DS-CDMA);Maximum likelihood;Multi-user detection;Genetic algorithm;High dimensionaloptimization.

Abstract. In this paper, we present an e�cient evolutionary algorithm for MultiuserDetection (MUD) problem in Direct Sequence-Code Division Multiple Access (DS-CDMA)communication systems. The optimum detector for MUD is the Maximum Likelihood(ML) detector, but its complexity is very high, and involves an exhaustive search to reachthe best �tness of the transmitted and received data. Thus, there has been much interestin suboptimal multiuser detectors with less complexity and reasonable performance. Theproposed algorithm is a modi�ed Genetic Algorithm (GA) which reduces the dimensionof the search space, and provides a suitable framework for future extension to otheroptimization problems, especially for high dimensional ones. This algorithm is comparedwith ML and two famous model-free optimization methods: Particle Swarm Optimization(PSO) and Ant Colony Optimization (ACO) algorithms, which have been used for MUDin DS-CDMA. The simulation results show that the performance of this algorithm is closeto the optimal detector; it has very low complexity, and it works better in comparison toother algorithms.c 2013 Sharif University of Technology. All rights reserved.

1. Introduction

In a DS-CDMA system, the signal is received anddetected by a Matched Filter Bank (MFB), whichconstitutes the conventional detector. This type ofreceiver is unable to optimally recover the signal,when the channel is contaminated by Additive WhiteGaussian Noise (AWGN), and su�ers from at orfrequency selective fading; because the DS-CDMAsignal is a�ected by Multiple Access Interference (MAI)

*. Corresponding author. Tel.: +98 9183371809E-mail address: [email protected] (A. Zahedi)

and also by the Near-Far Ratio (NFR) [1]. In fact, thesignature signals of di�erent users are not completelyorthogonal to each other, and cross correlation amongthese signals results in multiple access interference.Therefore, the conventional matched �lter detector, asin single user communication, is no longer e�ectiveand causes many problems [2]. In 1986, Verdu in [3]proposed the optimum multiuser detector (OMUD),which consists of a bank of matched �lters followed bya Maximum Likelihood Sequence Estimator (MLSE).The MLSE detector generates a maximum likelihoodsequence, b̂, which is associated with the transmit-ted sequence, as presented in Figure 1 [1]. Vector

2016 A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023

Figure 1. Baseband DS/CDMA block diagram, receiver with MUD [1].

b is estimated in order to maximize the sequencetransmission probability, given that r(t) is received,where r(t) is extended for all messages, considering allthe transmitted messages with the same transmissionprobability [1]. The OMUD has a computationalcomplexity which grows exponentially with the numberof users. Thus, since CDMA systems could potentiallyhave a large number of users, OMUD is unfeasibleto implement them. Therefore, many researches havefocused on sub-optimum detectors with less complexityand a performance which is almost as high as OMUD.Alternative detectors for OMUD include Decorrelatordetector proposed by Verdu in [3] and MMSE detectorrecommended by Poor and Verdu in [4]. These algo-rithms have reasonable computational complexity, andtheir performance is comparable to that of the optimumreceiver, but they yield a degraded communicationsystem in the sense of BER [5].

Much e�ort has been devoted to the developmentof suboptimal detectors with reasonable computationalcomplexity. Generally, the MUD problem is a Nonde-terministic Polynomial (NP)-time complete problem,so iterative algorithms and optimum tools are usedfor its solution. Kechriotis and Manolakos [6,7] pro-posed implementation of Hop�eld neural network forthe optimal CDMA multiuser detection, and in [8]generalized regression neural network has been ap-plied. A multistage joint detector is proposed in [9,10]to perform suboptimal maximum likelihood multiuserdetection. A multistage detector is proposed in [11]by Varanasy and Azhang. Honig et al. [12] alsointroduced a blind adaptive interference suppressiontechnique. In [13] a blind multiuser detector, usingsupport vector machine, was applied. The �rst GA-based multiuser detector (GA-MUD) was proposed byJuntti et al. [14] which assumes a synchronous CDMAsystem model communicating over an AWGN channel.To improve the convergence rate of GA, Ergun andHacioglu used a multistage multiuser detector as a part

of GA procedure in [15]. In [16], Hanzo et al. showedthat the convergence of GA is a�ected by the type ofGA operations and the associated system parameters,and GA is not inherently slow.

For better implementation of multiuser detec-tion, some novel techniques such as Particle SwarmOptimization (PSO) [17-21], Space-Time Linear Dis-persion [22] and Simulated Annealing [23] have beenused recently. In addition, ant colony-based MUD forsuboptimal detection is applied in [24-26]. We compareour proposed algorithm with the algorithm in [24], andalso with PSO algorithm [20], and we show that theperformance of the proposed method is better, and itis more e�cient in a high dimensional space and for asystem with a large number of users. These algorithmsare compared in the sense of complexity as well.

Although genetic algorithm is a strong methodin global search, it is known that many kinds ofgenetic algorithms are not guaranteed to �nd the globaloptimum exactly; especially when they encounter largescale problems [27]. It may be a source of inspirationto think about a size reducing algorithm to overcomethe so-called \curse of dimensionality". Our proposedalgorithm, which is based on a modi�ed genetic algo-rithm, reduces the problem of curse of dimensionality.

The remainder of this paper is organized asfollows: Section 2 describes our CDMA system model;Section 3 highlights the algorithm used to implementour proposed detector. The simulation results arepresented in Section 4, while Section 5 provides com-parison of the complexities associated with our algo-rithm and other methods. Finally, some conclusionsare drawn in Section 6.

2. System model

We use the equations presented in [1] to describea DS-CDMA system. We can consider a multiuserdetection as an optimization problem. Based on [28],

A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023 2017

the objective function for this problem is de�ned as(Log Likelihood Function (LLF)) [1]:

f(B) = BT r �BTRB; (1)

where r is the received signal, B is the bit sequencewith I bits, and R is the cross correlation matrix.The complete sequence for all K users can be obtainedthrough optimization of Eq. (1), resulting [1]:

B̂ = arg

(max[f(B)]B2f�1;+1gIK

): (2)

OMUD attempts to �nd the best vector of data bits,but because of high complexity and unfeasible imple-mentation, it is an ine�cient method for multiuserdetection. Because the optimization associated withOMUD is high dimensional, the dimension of the searchspace needs to be restricted; hence, all suboptimalalgorithms try to �nd a solution following an objectivefunction, which is able to improve the performance ofmultiuser detection. These attempts try to reduce thecomplexity of OMUD and maximize the DS-CDMAmean performance, with K active users. Most e�ortsconcentrate on approaching the performance of ML al-gorithm with less complexity and reliable applicabilityalong with the least possible error. In the next section,we propose our algorithm to achieve this goal andcompare our algorithm with other e�cient algorithmsavailable in the literature.

3. Proposed algorithm

It is well-known in the evolutionary computation liter-ature that basic genetic algorithms (and even manyother modi�ed evolutionary algorithms) have somede�ciencies in solution of large scale optimizationproblems. It is worthwhile to devise a dimensionreducing algorithm to surmount the so-called \curse ofdimensionality". One of the most important featuresof genetic algorithms is their ability to �nd the globaloptimum of a cost function [29-31]. Many of themodi�cations performed on the conventional GA's havetargeted this issue [32]. It is trivial that the optimiza-tion algorithm performs better when the number ofparameters is fewer. Thereby, decomposition of a largescale problem into small sub-problems is of substantialinterest. Such ideas are strong motivations for intro-ducing a novel GA which tries to simplify optimizationproblems and decompose them into simpler problems,since the probability of �nding the solution reduceswhen the number of parameters increases. To elaboratemore, consider the following example [32]:

F (~x) = 0:5 +�sin2 j~xj � 0:5

�e�0:2j~xj;

~x = (x1; x2; � � � ; xl) ; (3)

in which ~x is the vector of parameters of the problem.Obviously, the global minimum of the cost function islocated in ~x = 0 and its value is 0. First, consider~x = x1. As shown in Figure 2, in order to reach theglobal optimum, it is necessary for an individual tobe placed in the best region, which is highlighted inFigure 2. This region occupies a ratio of L1

L of thesearch space, which is a signi�cant part of the space.There are many precise tools which can assist GA toreach this global optimum easily.

Now, consider the following situation:

~x = (x1; x2) : (4)

The function is illustrated in Figure 3. Observethat the portion of the search space occupied by theattraction domain of the global optimum is propor-tional to

�L1L

�2 rather than L1L . Since L1

L < 1, thisfact directly causes a reduction in the chance of �ndingthe global optimum. When the number of parametersproliferates, the chance decreases exponentially.

Figure 2. The function F (~x) in ~x = x1 [32].

Figure 3. The function F (~x) in ~x = (x1; x2) [32].

2018 A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023

This fact is �rstly realized by a naive idea,i.e. neglecting some of the parameters of problem inthe optimization procedure. However, in reality, thealgorithm allows every parameter to change. The maindi�erence of the algorithm with conventional GA's isthat in each iteration, the algorithm is performed overa subset of parameters, while the other parameters arekept constant. In the next iteration, di�erent set ofparameters are selected to be constant. The set ofchangeable parameters are chosen according to a proce-dure described in the sequel. With a su�cient numberof repetitions, one can make sure that an appropriatesearching strategy is selected for the whole search spacewhich reduces the dimension of parameters in eachiteration of the conventional genetic algorithm. It isheuristically justi�able to initialize the algorithm bya \su�ciently good" solution which is determined byclassic detectors, such as the conventional sign detector.

Next, let us take a closer look at the objectivefunction. Considering Eq. (1); the objective functionis comprised of two terms: BT r and BTRB. Formaximizing the BT r part, considering the fact thateach element of B can only take the values of either1 or -1, it is enough for each element of B to be either1 or -1, according to the sign of corresponding memberin r. Since the BTRB term is a square matrix, if thenon-diagonal elements were small, it would practicallybe equal to BTB. In this case, it is indi�erent ifthe values of elements of B are either 1 or -1. Themain problem is that in most cases, some non-diagonalmatrix elements are not considerably small and cannotbe assumed as negligible. Because the matrix R issymmetric, these elements add terms of type 2RijBTi Bjto the objective function. In this case, if Rij is negative,the fact that BTi and Bj bear the same sign helpsto increase the value of the objective function, and ifRij is positive, their di�erence in sign helps this fact.In other words, the problem variables are no longerindependent, and their interaction is in uential. Thevariable showing more interaction with other variablesis considered to be a more signi�cant variable. Wepropose the following criterion as below:

idk =KXj=1

abs (Rkj) ; (5)

where K is the number of transmitted bits (assumingBPSK modulation). Any element of B for which idtakes a higher value is a more signi�cant and e�ec-tive variable, since it has high interaction with othervariables, and in uences the convergence of algorithmmore. As discussed, a number of variables (say M)are selected for optimization in the proposed algorithm,and the rest (K�M) are kept constant at the previousvalue. As we discussed, those variables with lower idare more likely to be at their optimal value, provided

by the conventional detector (initial value). Thus, itis better to take advantage of a probabilistic algorithmfor selection of M , so that the variables with higherid are more likely to be selected. Accordingly, theRoulette Wheel algorithm can be used in each iterationfor selection of variables with a probability proportionalto their id value. However, we take advantage of amethod with less computational cost. This is donethrough selection of a random number for each variable,having uniform distribution between zero and the idcorresponding to that variable. Then, the M variablespossessing larger random numbers are picked out. Thisaction, on one hand, makes all the variables likely to beselected, and on the other hand, makes those variableswith higher id more likely to be chosen. In the nextstep, a chromosome is created using these M variables,and the conventional genetic algorithm is performedon it once. Subsequently, the best response is saved asthe new values of these M variables, and this processcontinues again for the other set of variables. Thisprocess repeats until the selection of all variables. Afterseveral iterations, all variables are converged to theiroptimal value. The parts of this conventional geneticalgorithm are as follows.

3.1. Fitness function evaluationIn each generation, the �tness values are computed foreach chromosome. The �tness function is determinedby Eq. (1).

3.2. SelectionIn order to preserve better chromosomes (solutions) toyield better o�spring, we employ the truncated selec-tion scheme, through retaining only some of the parentchromosomes in the population, which possess larger�tness values, and reproduce them in the mating poolfrom which the two parent chromosomes are randomlyselected for the following crossover step [29,31].

3.3. CrossoverThe bits of the parent vectors are then exchangedusing the uniform crossover process in order to producetwo o�springs. The process of uniform crossoverinvokes a crossover mask, which is a sequence consistingof randomly generated 1s and 0s [29,31]. Figure 4illustrates an example of the crossover process.

3.4. MutationThe mutation process [29,31] refers to the alteration ofthe value attributed to a bit in the o�spring from 1 to-1 or vice versa, with a probability pm. Here, we set

Figure 4. Crossover process [29,31].

A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023 2019

pm = 1=K, such that, on average, only one bit in eachindividual is mutated. Figure 5 displays an example ofthis process.

The owchart of the proposed algorithm is pro-vided in Figure 6.

The algorithm seems to have another advantage.Fine tuning algorithms for GA's such as Tabu search

Figure 5. Mutation process [29,31].

Figure 6. The owchart of proposed algorithm.

and other types of local search are more e�cient inescaping from the local minima when the dimensionof the search space is low. Thereby, this algorithm ismore likely to perform better when combined with �ne-tuning algorithms.

4. Numerical results

In this section, the performance of the algorithm de-scribed in Section 3 is compared with two optimization-based algorithms, PSO and ACO, considering BERas the main �gure of merit. The convergence ofeach algorithm versus optimization parameters is alsoprovided. It is assumed that the communication systemis asynchronous DS-CDMA MUD, over slow Rayleighfading AWGN channel. The numerical results wereobtained based on the averaging of 1000 simulationruns; these results were attained in identical systemsand channel conditions in order to provide fair com-parison to other algorithms. Our results are presentedin form of examples. In all examples, the simulationparameters are as shown in Table 1.

The spread sequences are selected as Pseudo-Noise (PN) m-sequence; the number of active asyn-chronous users in the system is K = 20 and we setM = 4; the processing gain is N = 63. In all examples,it was assumed that the phases, amplitudes, channelgains and random delays of all users are perfectlyknown in the receiver, and users' power is:

E

"LXl=1

���a(i)k;l

���2# = 1; for k = 1; 2; � � � ;K: (6)

In all simulations, the population of PSO, ACO and theproposed genetic algorithm has been selected as 20, andthe iteration has been chosen as 100 for all methods.

Each simulation is presented as an example. Inthese examples, as will be seen, our proposed methodis more e�ective and better in comparison to the twoother algorithms presented before.

Example 1. In this example, the main parameterof each communication system, BER, is discussed.In Figure 7, the BER of the proposed algorithm iscompared with the two other algorithms, and also withthe comprehensive search in the space of parametersknown as ML and the worst case detector as Matched�lter. It is revealed that although in low SNR there isno main di�erence among the methods, the proposedgenetic algorithm in high SNR converges to optimumMUD, and the BER of this method is less than ACOand PSO methods. The proposed algorithm has betterperformance since it decomposes the MUD problemto several simpler problems, and causes better conver-gence and less BER. Figure 7 shows the unsuitabilityof the matched �lter form, MUD.

2020 A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023

Table 1. Simulation parameters.

Modulation BPSKSpreading code m-sequence with 63 chipsCommunication system Uplink asynchronous CDMAUser number (K) 20Channel AWGN with slow Rayleigh fadingM (number of higher id variablesin proposed algorithm)

4

Path number (L) 4Path loss variance -5 dB

Figure 7. BER of the proposed algorithm in comparisonto other methods versus SNR.

Figure 8. BER of the proposed algorithm versus numberof users in comparison to other methods. SNR is �xed at12 dB.

Example 2. In Figure 8, the e�ect of the increasingnumber of users on BER is analyzed for the classicalgorithms and optimization-based techniques such asACO and the proposed genetic algorithm. From this�gure, the BER of the proposed algorithm does notconsiderably increase with the increasing user numbers.This simulation is done for SNR=12 dB.

Example 3. In Figure 9, the proposed algorithm,with di�erent population sizes, is implemented, andthe numerical results are depicted. It is observed thatwith the population size 30, the algorithm convergesto optimum MUD. Of course, this fact happens also

Figure 9. BER of the proposed genetic algorithm versusnumber of generations in di�erent population sizes,p = 10; 20; 30. SNR is �xed at 15 dB.

Figure 10. BER versus the number of iterations inproposed algorithm and ACO, PSO, ML and MatchedFilter methods; SNR=7 dB.

for population sizes 20 and 10, but with delay inconvergence. As could be observed in the �gure, afterapproximately 70 iterations, the proposed algorithmoperates very well, and the convergence of this case isquite satisfactory. This simulation is carried out withSNR=15 dB.

Example 4. In Figure 10, BER versus the number ofiterations is illustrated, and it is revealed that the pro-posed algorithm converges faster and more accuratelyin comparison to ACO and PSO, because the proposedapproach reduces the probability of being trapped in

A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023 2021

Figure 11. Computation order of the proposed methodversus the number of users; comparison to ACO, ML andMatched �lter methods.

the local minimum. This property is very important,as the complexity of calculations is decreased to a greatextent, and noticeably, the cost of the detector andhardware is minimized. ACO and PSO algorithms arevery e�cient and applicable in MUD, and this �gureshows that our algorithm is comparable with thesealgorithms, and even in some cases, it works better, andits convergence is faster with lower complexity. Thissimulation is conducted in SNR=7 dB.

5. Computational complexity

A common form in order to compare algorithms'complexities can be done through the O notation,which means the order of magnitude associated withthe algorithm complexity. But, comparing algorithmswith only O can be insu�cient. In order to express thecomplexity of the analyzed algorithms, it is essential todetermine which instructions are carried out and howmany times they are processed [1]. If the number oftransmitted bits is I and the number of users is K,complexity is in the order of (KI)2 as most geneticalgorithms [11]. This relation is because both thenumber of Generations and the number of Populationsare proportional to KI, and the complexity of geneticalgorithms is proportional to the product of these twoparameters. For OMUD, the number of operationsincreases exponentially with the number of users, i.e.2KI .

Figure 11 shows that the complexity associatedwith our proposed algorithm is much less than ML andis comparable with ACO. Of course, because of thedecomposition in our proposed algorithm and repeti-tion of the calculations for the parameters of modi�edGenetic Algorithm, the complexity is increased a littleand it is more than the ACO complexity.

6. Conclusions

In this paper, multiuser detection based on the modi-�ed genetic algorithm was implemented, and through

presentation of a new search method, the desirableoptimization method was achieved. When comparedwith sub-optimal algorithms, such as ACO and PSO,the new algorithm shows better performance, andin some cases, rapidly approaches the optimal MLalgorithm. This algorithm is quite e�cient with goodinitial guesses and �ne tuning of parameters, and showsacceptable performance. The present paper is novelfrom two viewpoints: First, we have invented a newmodi�ed genetic algorithm which is powerful againsthigh dimension problems. This is very important,since we know that the curse of dimensionality isthe main cause of failure in large scale optimizationproblems. Second, we have de�ned a way to �nd moreimportant variables in DS-CDMA systems, i.e. wehave proposed that users with higher cross-correlationhave more important role in the �nal �tness function.The proposed method presents the selection criteria ofmore important parameters that in uence the conver-gence of the genetic algorithm. So the optimizationprocedure should be applied �rst to them and thento others. In the �eld of evolutionary computationthere are no powerful analytical studies on algorithms.However, that is a very di�cult work. We suggestinterested and capable readers to try that on thecurrent method.

References

1. Ciriaco, F., Abrao, T. and Jeszensky, P.J.E. \DS-CDMA multiuser detection with evolutionary algo-rithms", Journal of Universal Computer Science,12(4), pp. 450-480 (2006).

2. Proakis, J.G., Digital Communications, 3rd Ed.,McGraw-Hill, Singapore (1995).

3. Verdu, S. \Minimum probability of error for asyn-chronous Gaussian multiple access channels", IEEETrans. Inform. Theory, 32, pp. 85-96 (1986).

4. Poor, V.H. and Verdu, S. \Probability of error inMMSE multiuser detection", IEEE Trans. Inform.Theory, 43, pp. 50-60 (1997).

5. Lupas, R. and Verdu, S. \Linear multiuser detectorsfor synchronous code division multiple-access chan-nels", IEEE Trans. Inform. Theory, 35, pp. 123-136(1989).

6. Kecheriotis, G.I. and Manolakos, E.S. \Hop�eld neuralnetwork implementation of the optimal CDMA mul-tiuser detector", IEEE Trans. Neural Networks, 7, pp.131-141 (1996).

7. Kecheriotis, G.I. and Manolakos, E.S \A hybrid digi-tal signal processing-neural network CDMA multiuserdetection scheme", IEEE Trans. Circuits System, 43,pp. 96-104 (1996).

8. Rajabpour, M., Razzazi, F. and Bakhshi, H. \adaptivemultiuser detection in DS-CDMA systems using gener-alized regression neural network", IEEE International

2022 A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023

Symposium on Operations and Management, pp. 462-465 (2012).

9. Guo, Z. and Letaief, K.B. \An e�ective multiuserreceiver for DS-CDMA systems", IEEE Journal. Sel.Areas Commun., 19, pp. 1019-1028 (2001).

10. Fang, H., Gunawan, E., Guan, Y. and Zheng, L.\Improved two-stage CMA-based blind receivers forjoint equalization and multiuser detection", IET Com-munications Journal, 9(6), pp. 1131-1136 (2012).

11. Varnasi, M.K. and Azhang, B. \Multistage detection insynchronous code-division multiple-access communica-tions", IEEE Trans. Commun., 38, pp 509-519 (1990).

12. Honig, M., Madhow, U. and Verdu, S. \Blind multiuserdetection", IEEE Trans. Inform. Theory, 41, pp. 944-960 (1995).

13. Kao, J.W.H., Berber, S.M. and Kecman, V. \Blindmultiuser detector for chaos-based CDMA using sup-port vector machine", IEEE Transactions on NeuralNetworks, 21(8), pp. 1221-1231 (2010).

14. Juntti, M.J., Schlosser, T. and Lilleberg, J.O. \Ge-netic algorithms for multiuser detection in synchronousCDMA", In Proc. IEEE Int. Sympos. on InformationTheory, p. 492 (1997).

15. Ergun, C. and Hacioglu, K. \Multiuser detectionusing a genetic algorithm in CDMA communicationssystems", IEEE Trans. Commun., 48, pp. 1374-1383(2000).

16. Hanzo, L., Yang, L.L., Kuan, E.L. and Yen, K.,Single and Multi-Carrier CDMA: Multi-User Detec-tion, Space-Time Spreading, Synchronization, Stan-dards and Networking, IEEE Press/Wiley, Piscataway,NJ (2003).

17. Lu, Z. and Yan, S. \Multiuser detector based onparticle swarm algorithm", In Proc. IEEE 6th CSSET,2, pp. 783-786 (2004).

18. Zhao, Y. and Zheng, J. \Multiuser detection employingparticle swarm optimization in space-time CDMAsystems", In Proc. ISCIT2005, pp. 940-942 (2005).

19. El-Mora, H.H., Sheikh, A.U. and Zerguine, A. \Ap-plication of particle swarm optimization algorithm tomultiuser detection in CDMA", In Proc. IEEE 16thISPIMRC, pp. 2522-2526 (2005).

20. Guo, Z., Xiao, Y. and Lee, M.H. \Multiuser detectionbased on particle swarm optimization algorithm overmultipath fading channels", IEICE Trans. Commun.,2, pp. 421-424 (2007).

21. Xiazhi, L., Dawei, F. and Tianshuang, Z. \multi-user detection of DS-CDMA based on PSO-ICA",IEEE International Conference on Image and SignalProcessing, pp. 2490-2493 (2011).

22. Xiao. P., Wu, J., Sellathurai, M., Ratnarajah, T.and Strom, E.G. \Iterative multiuser detection anddecoding for DS-CDMA system with space-time lineardispersion", IEEE Transactions on Vehicular Technol-ogy, 58(5), pp. 2343-2353 (2009).

23. Yanping, L., Hengshan, Z., Deqian, M. and Xiaoming,C. \Adaptive IA-TCNN multiuser detector based onsimulated annealing of optimization", Journal of En-ergy Procedia, 17(A), pp. 588-594 (2012).

24. Chong, X., Maunder, R.G., Yang, L.L. and Hanzo, L.\Near-optimum multiuser detectors using soft-outputant-colony-optimization for the DS-CDMA uplink",IEEE Signal Processing Letters, 16, pp. 137-140(2009).

25. Zhao, N., Xianwang, L. and Wu, Z. \A hybrid antcolony optimization algorithm for optimal multiuserdetection in DS-UWB system", Expert Systems withApplications, 39(5), pp. 5279-5285 (2012).

26. Filho, J.C.M, Souza, R.N. and Abrao, T. \Ant colonyinput parameters optimization for multiuser detectionin DS-CDMA systems" J. of Expert Systems withApplications, 39(17), pp. 12876-12884 (2012).

27. Nelles, O., Nonlinear System Identi�cation, Springer(2001).

28. Verdu, S., Multiuser Detection, Cambridge UniversityPress, Cambridge, U.K. (1998).

29. Haupt, R.L. and Haupt, S.E., Practical Genetic Algo-rithms, 2nd Ed., John Wiley & Sons Inc. (2004).

30. Sivanandam, S.N. and Deepa, S.N., An Introductionto Genetic Algorithms, Springer-Verlag, Heidelberg,Berlin (2008).

31. Goldberg, D. and Reading, M., Genetic Algorithm inSearch Optimization and Machine Learning, Addison-Wesley (1989).

32. Jafari, S., Abdolmohammadi, H.R., Nazari, M.E. andShayanfar, H.A. \A new approach for global opti-mization in high dimension problems", IEEE Powerand Energy Society General Meeting - Conversion andDelivery of Electrical Energy in the 21st Century, pp.1-7 (2008).

Biographies

Abdulhamid Zahedi was born in Kermanshah, Iran,in 1983. He received his BS degree in ElectricalEngineering from Amirkabir University of Technology,Iran, in 2005 and his MS degree from Shahed Uni-versity, Iran, in Communication Engineering, in 2008.Now, he is Ph.D. candidate in Electrical Engineeringin Science and Research branch of Tehran, IslamicAzad university, Iran. His interest �elds of researchare multiuser detection and wireless telecommunica-tion, specially CDMA and MIMO-OFDM communica-tions.

Hamidreza Bakhshi received his BS degree in Elec-trical Engineering from Tehran University of technol-ogy, Iran, in 1993 and his MS degree from TarbiatModarres University, Iran, in Communication Engi-neering in 1996. He began his PhD in 1997 in TarbiatModarres University in Iran, and received his PhD

A. Zahedi et al./Scientia Iranica, Transactions D: Computer Science & ... 20 (2013) 2015{2023 2023

degree in 2001. Currently, he is the faculty of ShahedUniversity in Electrical Engineering department. Hisinterest �elds are wireless telecommunication, arrayantenna, CDMA and MUD and MIMO-OFDM com-munications.

Sajad Jafari was born in Kermanshah, Iran, in 1983.He received his BS and MS degrees in Biomedical En-gineering, in 2005 and 2008, from Amirkabir Universityof Technology, Tehran, Iran. Currently, he is pursuinghis PhD degree in Biomedical Engineering at AmirkabirUniversity of Technology. His research interests includearti�cial intelligence, optimization, pattern recognitionand especially chaotic signals and systems.

Hamid Reza Abdolmohammadi was born inKhomein, Iran, in 1983. He received his BS degreefrom Amirkabir University of Technology, Tehran, Iran,in 2005, and his MS degree from Iran University ofScience and Technology, Tehran, Iran, in 2008, all inElectrical Engineering. He is currently pursuing his

PhD degree in Electrical Engineering Department atIran University of Science and Technology, Tehran. Hisresearch interests include operation and economics ofpower systems, and arti�cial intelligence.

Mohammad Reza Rajati was born in Kermanshah,Iran, in 1984. He received his BS degree in ElectricalEngineering (major option in Systems and Control)from Amirkabir University of Technology, Tehran, Iran,in 2005. He received his Master's degree in Mechatron-ics Engineering from K. N. Toosi University of Technol-ogy, Tehran, Iran, in 2008. He is currently pursuing hisPhD degree in the Signal and Image Processing Insti-tute, Department of Electrical Engineering, Universityof Southern California, Los Angeles, USA, where heis an Annenberg Fellow. His main research interestsfall in the area of omputational Intelligence, with morefocus on fuzzy logic and Computing with Words andtheir applications to decision making, control systemsand signal processing. He is also interested in classicalsystems and control theory.