A Machine-Learning-Based Blind Detection On Interference Modulation Order in NOMA Systems
A Machine-Learning-Based Blind Detection On Interference Modulation Order in NOMA Systems
Abstract— In order to blindly detect the modulation order interference user in power-domain NOMA. Anderson-Darling
of interference signals in downlink non-orthogonal multiple test (AD) extracts features from received constellation points
access systems, a machine learning (ML) algorithm based on and its introduction makes machine learning algorithm feasible
Anderson–Darling test is proposed in this letter. The proposed
algorithm adopts ML to determine the modulation order of in blind detection area.
interference user equipment from the raw received constellation The technical contributions of this letter include:
points automatically. In feature extraction, a novel feature is • Proposing a new feature of received constellation points
introduced to improve the accuracy of blind detection. To eval- after equalization with Anderson-Darling test.
uate the performance of blind detection, the detection rate • Introducing machine learning algorithm to blind detection
and the throughput are simulated under different scenarios.
Simulation results show that the proposed algorithm outperforms
area in communication discipline.
conventional algorithm on modulation order detection. • Proposing a new blind detection algorithm based on
Anderson-Darling test and machine learning algorithm.
Index Terms— Blind detection, machine learning, Anderson-
Darling test, modulation order, NOMA.
II. S YSTEM M ODEL
This letter considers a downlink single-cell scenario which
I. I NTRODUCTION
consists one base station (BS) and N user equipments (UEs).
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on October 18,2023 at 04:10:20 UTC from IEEE Xplore. Restrictions apply.
2464 IEEE COMMUNICATIONS LETTERS, VOL. 22, NO. 12, DECEMBER 2018
Fig. 3. The features of QPSK and 16QAM when modulation order of target
user is 64QAM on different SNRs.
Fig. 2. The diagram of MLAD, including two phases: training phase and constellation points. For the sake of simplicity, the set of
blind detection phase. clusters are denoted by
Dpc = {· · · , Sj , · · · }, j = 1, · · · , 2pc . (5)
(i)
Defining r as the received constellation points vector after
equalization at the user Ui . Then, r (i) can be written as 2) Feature Extraction: Feature extraction is the most impor-
tant part in the proposed algorithm. It reduces the complexity
r (i) = H (i) t + n(i) , (3) of received constellation points. The goal of this step is
to extract accurate features of received constellation points.
where H (i) denotes the channel matrix after equalization, and AD test is used to extract features which can be written as [12]
n(i) is the additive noise vector, whose elements are inde-
K
pendent and identically-distributed (i.i.d.) complex Gaussian. 2k − 1 (i) (i)
A2 = −K − [ln(F (rk )) + ln(1 − F (rK+1−k ))],
E[|n(i) |2 ] = σi2 , where E[·] denotes the expectation operator, K
k=1
and |·| represents the absolute value of a complex number. The
(6)
aim of blind detection is to determine the modulation order of
interference user from r (i) . where F (·) is hypothesized distribution function and {r1 <
(i)
(i) (i)
r2 < · · · < rK } is the ordered data. Stephens shows that for
III. P ROPOSED A LGORITHM the case where the mean (μ) and variance (σ) are estimated
from data, the statistic must be corrected according to [12]
In this section, we introduce a new feature of received
constellation points r (i) and propose a MLAD algorithm, 4 25
A2∗ = A2 (1 + − 2 ). (7)
including clustering, feature extraction, classification training n n
and model parameter selection criteria. Its block diagram is The formula for p-value depends on the value of AD
shown in Fig.2. Without loss of generality, two users are statistic. There are two methods to calculate p-value, which
considered in the remainder of this letter. can be found in [13]. Assuming that the p-value of Sj in Dpc
(p )
is pj c . Then, the feature of received signals is
A. Training Phase 2 pc
1 (pc )
1) Clustering: Assuming that the noise at the receiver is fi = p i = 1, · · · , w, (8)
additive white Gaussian noise (AWGN). Defining Sj as a 2pc j=1 j
cluster of received points. Sj has the minimum Euclidean norm
where w is the number of candidate modulation orders for
to the j-th composite constellation point from Cpc , which can
interference user. The physical meaning of fi is the average
be written as
extent that each cluster obeys Gaussian distribution when we
(i)
Sj = {rk }, split received constellation into 2pc clusters. After performing
(i) (i) feature extraction, we can get a feature vector
s.t. ||rk − cj || < ||rk − cz ||, cj , cz ∈ Cpc , cj = cz . (4)
f = [· · · , fi , · · · ]T , i = 1, · · · , w. (9)
where j is in the range of [1 . . . 2pc ] and pc is one of candidate
composite modulation orders. To make it easier to understand, the features extracted from
In this step, all candidates of modulation order for different combinations of modulation orders and SNRs are
interference user should be used to cluster received shown in Fig. 3.
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on October 18,2023 at 04:10:20 UTC from IEEE Xplore. Restrictions apply.
ZHANG et al.: ML-BASED BLIND DETECTION ON INTERFERENCE MODULATION ORDER IN NOMA SYSTEMS 2465
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on October 18,2023 at 04:10:20 UTC from IEEE Xplore. Restrictions apply.
2466 IEEE COMMUNICATIONS LETTERS, VOL. 22, NO. 12, DECEMBER 2018
R EFERENCES
[1] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, “Power-
domain non-orthogonal multiple access (NOMA) in 5G systems: Poten-
tials and challenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 2,
Fig. 5. Throughput comparisons on different detection algorithms. Target pp. 721–742, 2nd Quart., 2017.
user: 16QAM (MCS=11), Interference user: QPSK (MCS=5). [2] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. Bhar-
gava, “A survey on non-orthogonal multiple access for 5G networks:
Research challenges and future trends,” IEEE J. Sel. Areas Commun.,
vol. 35, no. 10, pp. 2181–2195, Oct. 2017.
[3] L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor, “Reinforcement learning-
based NOMA power allocation in the presence of smart jamming,” IEEE
Trans. Veh. Technol., vol. 67, no. 4, pp. 3377–3389, Apr. 2018.
[4] Y. Du et al., “Efficient multi-user detection for uplink grant-free NOMA:
Prior-information aided adaptive compressive sensing perspective,” IEEE
J. Sel. Areas Commun., vol. 35, no. 12, pp. 2812–2828, Dec. 2017.
[5] N. Zhang, J. Wang, G. Kang, and Y. Liu, “Uplink nonorthogonal multiple
access in 5G systems,” IEEE Commun. Lett., vol. 20, no. 3, pp. 458–461,
Mar. 2016.
[6] Study on Downlink Multiuser Superposition Transmission (MUST) for
LTE (Release 13), document 3GPP Tr 36.859 v13.0.0, 3GPP, Dec. 2015.
[7] LS on Potential Parameters for Blind Detection in Must, document R1-
163836, 3GPP RAN1 #84bis, Busan, Korea, Apr. 2016.
[8] A. Bayesteh, E. Yi, H. Nikopour, and H. Baligh, “Blind detection of
SCMA for uplink grant-free multiple-access,” in Proc. IEEE 11th Int.
Fig. 6. Throughput comparison on different detection algorithms. Target Symp. Wireless Commun. Syst. (ISWCS), Aug. 2014, pp. 853–857.
user: 64QAM, Interference user: QPSK. [9] O. A. Dobre, A. Abdi, Y. Bar-Ness, and W. Su, “Survey of automatic
modulation classification techniques: Classical approaches and new
trends,” IET Commun., vol. 1, no. 2, pp. 137–156, Apr. 2007.
algorithm has more prior experience than benchmark scheme. [10] H. Lee, J.-H. Lim, S. Cho, and S. Kim, “Interference cancellation based
The prior experience is learned from numbers of training on blindly-detected interference parameters for LTE-advanced UE,” in
examples in the training phase, and it is saved in model Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2015, pp. 3143–3148.
[11] S. Huang, Y. Yao, Y. Xiao, and Z. Feng, “Cumulant based maximum
parameter. likelihood classification for overlapped signals,” Electron. Lett., vol. 52,
The accuracy improvement of blind detection improves no. 21, pp. 1761–1763, 2016.
the throughput performance. From Fig. 5, it is clear that [12] M. A. Stephens, “EDF statistics for goodness of fit and some compar-
isons,” J. Amer. Statist. Assoc., vol. 69, no. 347, pp. 730–737, 1974.
the throughput of the proposed algorithm is very closed [13] R. B. D’Agostino, Goodness-of-fit-Techniques. Evanston, IL, USA:
to the ideal curve, and achieves larger gains compared to Routledge, 2017.
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on October 18,2023 at 04:10:20 UTC from IEEE Xplore. Restrictions apply.