Open Access Open Access  Restricted Access Subscription or Fee Access

Multiuser Detection using Direct Sequence – CDMA

B. Brundha, T.M. Thamizh Thendral, Sri Bhavani, C. Saravanan


This paper presents three low-complexity, yeteffective, multiuser detectors (MUDs) for the uplink of spatial–frequency–time-domain (SFT-domain) spread multicarrier (MC) direct-quence code-division multiple-access (DS-CDMA) systems.Each MUD first converts a received signal into the corresponding format. It then detects the transmitted symbols iteratively byusing a one-domain (1D) minimum-mean-square-error (MMSE) detector and a two-domain (2D) MMSE detectoralternately.The weights of the 1D detector are updated to minimize the mean-square error (MSE) of the detection output by setting the weights of the 2D detector at the values determined in the previous iteration, and vice versa. Performance analyses of the bit-error-rate (BER) bound, the convergence, and the required computational complexity are conducted to assess the feasibility of the proposed MUDs. Finally, the results of computer simulations demonstrate that the performance of the proposed schemes is close to that of the joint SFT-domain MMSE MUD in most scenarios but with lower computational overheads.



Code-division multiple access (CDMA), minimum mean square error (MMSE) , multipath fading, multiple-access interference (MAI), multiuser detector (MUD).

Full Text:



I.F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, Vol 47, No 4, March 2005, pp. 445- 487.

A.A. Franklin and C. S.R Murthy, “An introduction to wireless mesh networks,” in Security in Wireless MeshNetworks,” Y. Zhang, J. Zheng, and H. Hu, Eds. CRCPress, 2007, pp. 3-44.

L. Santhanam, B. Xie, and D.P. Agrawal, “Selfishness in mesh networks: wired multihop MANETs,” IEEE WirelessComm. Magazine, Vol 15, No 4, August 2008, pp. 16-23.

S. Marti, T.J. Giuli, K. Lai, and M. Baker, ”Mitigating routing misbehavior in mobile ad hoc networks,” in

Proceeedings of MobiCom 2000, pp. 255-265.

S. Buchegger and J.-Y. L. Boudec, “Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks,” In Proc. ofMobiHoc, 2002, pp. 226-236.

R. Mahajan, M. Rodrig, D. Wetherall, and John Zahorjan , “Sustaining cooperation in multihop wireless networks,” in Proc. of NSDI 2005, Vol 2, pp. 231-244.

G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, “An intrusion detection tool for AODV-based ad hoc wireless networks,” in Proc ofAnnual Comp. Sec. Appl. Conf (ACSAC) 2004, pp. 16-27.

A. Pirzada and C. McDonald, “Establishing trust in pure ad hoc networks,” in Proceedings of the 27thAustralianConference on Computer Science, 2004, pp. 181-199.

M. Conti, E. Gregori, and G. Maselli, “Reliable and efficient forwarding in MANETs,” Ad Hoc NetworksJournal, Vol 4, No 3, 2006, pp. 398-415.

L. Santhanam et al, “Distributed self-policing architecture for fostering node cooperation in wireless mesh networks,” in Proc. of PWC 2006, Vol 4217, pp. 147-158.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.