New adaptive array algorithm for interference suppression in wireless communications

Xiaodong Wang, H. Vincent Poor

Research output: Contribution to journalConference article

2 Scopus citations

Abstract

In the application of antenna arrays to wireless communications, a known signal preamble is used for estimating the array response at the beginning of each data frame. The estimated array response is then used in linear combining the array input for interference suppression and demodulation of the desired user's information data. Since the training preamble is usually very short, the conventional training methods, which estimate the array response based solely on the training preamble, may incur large estimation errors. In this paper, we propose a subspace-based technique for array response estimation, which exploit the whole frame of the received signal. It is shown that as the length of the data frame tends to infinity, in the absence of noise, this method can recover the array response of the desired user exactly, given a small number of training symbols of that user. We also derive expressions for the subspace-based array combining weights based on zero-forcing and MMSE criteria. Simulation results show that the proposed method offers substantial performance gain over the conventional direct matrix inversion (DMI) method for adaptive arrays. The proposed technique can be readily extended to dispersive channels to combat both co-channel interference (CCI) and intersymbol interference (ISI).

Original languageEnglish (US)
Pages (from-to)1655-1659
Number of pages5
JournalIEEE Vehicular Technology Conference
Volume3
StatePublished - Dec 1 1998
EventProceedings of the 1998 48th IEEE Vehicular Technology Conference, VTC'98. Part 3 (of 3) - Ottawa, Can
Duration: May 18 1998May 21 1998

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'New adaptive array algorithm for interference suppression in wireless communications'. Together they form a unique fingerprint.

  • Cite this