This article presents comprehensive comparisons of interleave division multiple access (IDMA) and direct sequence code division multiple access (DS-CDMA) in terms of performance and complexity assuming iterative multiuser detection. IDMA can be seen as a special case of DS-CDMA with spreading gain of one using very low rate code and user-specific interleavers for user separation. We focus on three suboptimum linear detectors: minimum mean square error (MMSE), rake (or matched filter), and soft-rake detectors from practical concerns. We analytically prove that the three detectors are equivalent for asynchronous users of IDMA on frequency flat channels for complex modulation alphabets. Such equivalence has been shown only for binary phase shift keying (BPSK) in the literature. The equivalence guarantees the MMSE solution for IDMA without computationally expensive matrix inversions or matrix-vector multiplications. This is generally not the case for DS-CDMA since DS-CDMA is sensitive to user asynchronism. We also discuss complexity aspects when the MMSE detector is used where we focus on essential differences in complexity between IDMA and DS-CDMA, instead of discussing particular complexity reduction techniques. Computer simulations are performed in various scenarios and the performance is analyzed by bit error rate simulations as well as by extrinsic information transfer (EXIT) charts. The analysis reveals the advantages of IDMA over DS-CDMA in terms of performance and complexity under practical considerations, particularly in highly user loaded scenarios.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Cost-Optimal Caching for D2D Networks With User Mobility: Modeling, Analysis, and Computational Approaches - 2018ABSTRACT:Caching well-liked files at the user equipments (UEs) provides an efficient way to alleviate
PROJECT TITLE :Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure - 2018ABSTRACT:This Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-link security
PROJECT TITLE :Simulation, Analysis, and Verification of Substrate Currents for Layout Optimization of Smart Power ICsABSTRACT:Today circuit failures in Smart Power ICs because of substrate couplings are partially addressed during
PROJECT TITLE :Modeling, Analysis, and Scheduling of Cluster Tools With Two Independent ArmsABSTRACT:Twin-armed cluster tools for semiconductor manufacturing sometimes have had two arms fixed in opposite directions. Recently,
PROJECT TITLE :Modeling, Analysis, and Detection of Internal Winding Faults in Power TransformersABSTRACT:The winding interturn fault is critical in power transformers since its result is not simply comprehensible at lower magnitude

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry