Skip to main content

Clonal Selection Detection Algorithm for the V-BLAST System

  • Conference paper
Advances in Natural Computation (ICNC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4222))

Included in the following conference series:

  • 926 Accesses

Abstract

A novel detection algorithm for V-BLAST system is proposed, based on the clonal selection theory and the idea of immune evolution. The complexity of the clonal selection detection algorithm for V-BLAST system (CA-VBLAST) is analyzed and the bit error ratio (BER) performance is verified via computer simulations. Simulation results show that the BER performance of CA-VBLAST detector with proper algorithm parameters is comparable with the maximum likelihood (ML) detector which presents the best BER performance but the highest computational complexity, and our CA-VBLAST detector obtains a much more decreased complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foschini, G.J., Gans, M.J.: On limits of wireless communications in a fading environment when using multiple antenna. Wireless personal communications 6(3), 311–335 (1998)

    Article  Google Scholar 

  2. Chuah, C.-N., Foschini, G.J., et al.: Capacity growth of multi-element arrays in door and outdoor wireless channels. In: Proc of IEEE WCN 2000, Chicago, USA (2003)

    Google Scholar 

  3. Tarokh, V., Naguib, A., Seshadri, N.: Combined array processing and space-time coding. IEEE Trans. Inform. Theory 45(4), 1121–1128 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  4. Foschini, G.J.: Layered Space-time Architecture for Wireless Communication in a Fading Environment when Using Multi-element Antennas. Bell Labs Technical Journal 1(2), 41–59 (1996)

    Article  Google Scholar 

  5. Wolniansky, P.W., Foschini, G.J., Golden, G. D., Valenzuela, R.A.: V-BLAST: An architecture for realizing very high data rates over the rich-scattering wireless channel. In: Proc. URSI Int. Symp. Signal, Systems, and Electronics, Pisa, Italy (1998)

    Google Scholar 

  6. Adjoudani, A., Beck, E.C., Burg, A.P., et al.: Prototype experience for MIMO BLAST over third-generation wireless system. IEEE Journal on Selected Areas in Communications, 440–451 (2003)

    Google Scholar 

  7. Golden, G.D., Foschini, C.J., Valenzuela, R.A., Wolniansky, P.W.: Detection algorithm and initial laboratory results using V-BLAST space-time communication architecture. Electronics Letters 45(1), 14–16 (1999)

    Article  Google Scholar 

  8. Bhargave, A., de Figueiredo, R.J.P., Eltoft, T.: A detection algorithm for the V-BLAST system. In: IEEE Global Telecommunications Conference, pp. 494–498 (2001)

    Google Scholar 

  9. De Castro, L.N., et al.: The Clonal Selection Algorithm with Engineering Applications. In: Proc. of GECCO 2000, Workshop on Artificial Immune Systems and Their Applications, pp. 36–37 (2000)

    Google Scholar 

  10. Kim, J., et al.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the 2001 Congress on Evolutionary Computation, pp. 1244–1252 (2001)

    Google Scholar 

  11. Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the 2001 Congress on Evolutionary Computation, pp. 1244–1252 (2001)

    Google Scholar 

  12. Du, H., Jiao, L., Wang, S.: Clonal Operator and Antibody Clone Algorithms. In: Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing, November 4-5, 2002, pp. 506–510 (2002)

    Google Scholar 

  13. Du, H., Jiao, L., Gong, M.: Immune Memorizing Clonal Programming Algorithm. In: Proceedings of the Thirteenth Chinese Conference on Neural Network (2003)

    Google Scholar 

  14. Du, H., Jiao, L., Gong, M.: Immune Clonal Selection Algorithm and Evolutionary Algorithm. In: Proceedings of the Tenth Annual Science Seminar of Chinese Conference on Artificial Intelligence (2003)

    Google Scholar 

  15. Gong, M., Du, H., Jiao, L., Wang, L.: Immune clonal selection algorithm for multiuser detection in DS-CDMA systems. In: Webb, G.I., Yu, X. (eds.) AI 2004. LNCS (LNAI), vol. 3339, pp. 1219–1225. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Wai, W.K., Tsui, C.-Y., Cheng, R.S.: A low complexity architecture of the V-BLAST system. In: Wireless Communications and Networking Conference, WCNC, vol. 1, pp. 310–314. IEEE, Los Alamitos (2000)

    Google Scholar 

  17. Wang, X., Cao, L.: Genetic Algorithm - Theoretical Application and Software Implement. Xi’an Jiao Tong University Press (2002) (in chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mu, C., Zhu, M. (2006). Clonal Selection Detection Algorithm for the V-BLAST System. In: Jiao, L., Wang, L., Gao, X., Liu, J., Wu, F. (eds) Advances in Natural Computation. ICNC 2006. Lecture Notes in Computer Science, vol 4222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11881223_49

Download citation

  • DOI: https://doi.org/10.1007/11881223_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45907-1

  • Online ISBN: 978-3-540-45909-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics