- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

The Scientific World Journal

Volume 2013 (2013), Article ID 547656, 8 pages

http://dx.doi.org/10.1155/2013/547656

## A Multiuser Detector Based on Artificial Bee Colony Algorithm for DS-UWB Systems

School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin 150001, China

Received 3 June 2013; Accepted 10 July 2013

Academic Editors: P. Agarwal, V. Bhatnagar, J. Yan, and Y. Zhang

Copyright © 2013 Zhendong Yin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

Artificial Bee Colony (ABC) algorithm is an optimization algorithm based on the intelligent behavior of honey bee swarm. The ABC algorithm was developed to solve optimizing numerical problems and revealed premising results in processing time and solution quality. In ABC, a colony of artificial bees search for rich artificial food sources; the optimizing numerical problems are converted to the problem of finding the best parameter which minimizes an objective function. Then, the artificial bees randomly discover a population of initial solutions and then iteratively improve them by employing the behavior: moving towards better solutions by means of a neighbor search mechanism while abandoning poor solutions. In this paper, an efficient multiuser detector based on a suboptimal code mapping multiuser detector and artificial bee colony algorithm (SCM-ABC-MUD) is proposed and implemented in direct-sequence ultra-wideband (DS-UWB) systems under the additive white Gaussian noise (AWGN) channel. The simulation results demonstrate that the BER and the near-far effect resistance performances of this proposed algorithm are quite close to those of the optimum multiuser detector (OMD) while its computational complexity is much lower than that of OMD. Furthermore, the BER performance of SCM-ABC-MUD is not sensitive to the number of active users and can obtain a large system capacity.

#### 1. Introduction

Since the concept of ultra-wideband (UWB) technology was put forward by FCC in the 1990s, UWB technique has drawn a lot of attention in the theoretic research, industrial application, and many other areas because of its attractive features such as high data transmission rate, low power density, high interference resistance, and strong multipath resolution [1–3].

Multiuser detection (MUD) is a method to eliminate the effect of multiple access interference (MAI). The multiple accesses are commonly divided into two paths: time hopping (TH-UWB) and direct sequence (DS-UWB) [4]. In recent years, the increase in demand for multiple access applications with high data transmission rates has prompted the development of multiuser detection (MUD) techniques in such systems to suppress the MAI and improve the system performance. Optimum multiuser detection (OMD) was provided by Verdu in 1986 [5]; OMD makes the BER performance of multiple access system approximate to single-user system. But it has a high computational complexity, so it has poor real-time characteristic confines in engineering. Therefore, suboptimal detectors which may approximate OMD’s BER performance with an acceptable computational complexity have become a focus of research. A code-aided interference suppression method was introduced for NBI restriction in DS-UWB systems [6]. A multiuser frequency-domain (FD) turbo detector was employed which combines FD turbo equalization schemes with soft interference cancellation [7]. Adaptive MUD methods using the recursive least square (RLS) principles were proposed in [8, 9]. However, the tradeoff problem between BER performance and computational complexity still exists.

Swarm intelligence is a research branch that models the population of interacting agents or swarms that are able to self-organize. Several modern heuristic algorithms have been developed for solving combinatorial and numeric optimization problems [10]. Artificial Bee Colony (ABC) algorithm is an optimization algorithm based on the intelligent behavior of honey bee swarm [11, 12], and some extended and efficient ABC algorithms are presented to improve the performance of ABC [13, 14].

It has been demonstrated that ABC algorithm for numerical optimization problems has more superior performance than those based on heuristics algorithm [15]. ABC algorithm has been widely used in neural network training practice [16], path optimization [17], and back analysis [18]. However, no literatures have been reported that ABC was used in the multiuser detection (MUD) fields. In order to possess a good BER performance and a low time complexity, we investigate an efficient multiuser detector by selection of initial states based on code mapping for the Artificial Bee Colony algorithm (SCM-ABC-MUD) in DS-UWB systems. As a kind of swarm intelligence methods, ABC is selected here for its significant ability to search for the global optimal value and to adapt its searching space automatically [19, 20]. And its basic motivation is to find the global optimum by simulating the bees’ behaviors [21]. This proposed algorithm makes use of the thought of ABC’s iterative optimization and the result of the suboptimal detectors based on code mapping. Simulation results show that the BER performance and near-far effect (NFE) resistance capability of this algorithm are better than those of matched filter (MF), DEC, and MMSE detectors and even close to OMD.

The paper is organized as follows. In Section 2, the MUD model is introduced and a suboptimal detector based on code mapping is proposed. Then in Section 3, the basic principles of the Artificial Bee Colony (ABC) algorithm and the proposed SCM-ABC-MUD algorithm are illustrated. In Section 4, simulation experiments that compare the performance of different MUD algorithms are analyzed, followed by conclusions given in Section 5.

#### 2. MUD Models and Methods

##### 2.1. Multiuser DS-UWB System Model

In theory, a -user synchronous DS-UWB system under the additive white Gaussian noise (AWGN) channel is considered which is not subjected to the frequency selective multipath. And assume each user employs the binary phase-shift key (BPSK) modulation. Then the th user’s transmit signal can be written as where is the length of bits per packet and BPSK symbols are spread with the specific PN codes , which are the binary bit stream valued only by −1 or 1. is the symbol duration, is the pulse repetition period, equals to , and represents the transmitted pulse waveform generally characterized as the second derivative of Gaussian pulse where and are the pulse center and the pulse shape parameter.

The total received signal composed by different signals of all users is where is the amplitude of the th received signal and is zero-mean additive white Gaussian noise with the unilateral power spectral density of .

##### 2.2. Classical Multiuser Detectors

###### 2.2.1. Matched Filters (MFs)

The traditional receiver of a DS-UWB system consists of a pulse demodulator and a set of matched filters (MFs) corresponding to each user. Let the output of a bank of single-user MFs be a -dimensional vector, the vector represent the output of sign detectors, the vector denotes the correct bits of each user, and the vector denotes the output of noise from matched filters which is a zero mean Gaussian random. So, the output of the MFs can be represented as follows: where denotes the cross-correlation matrix, in which , and in which the diagonal element represents the signal amplitude of the th user.

###### 2.2.2. Optimum Multiuser Detection (OMD)

According to the theory of OMD, the optimum detection result satisfies the following expression:

It is known that the selection of this optimal solution in the -dimensional Euclidean solution space is generally a nondeterministic polynomial hard problem, but the computational complexity of the OMD method is , and is the number of active users.

###### 2.2.3. Suboptimal Multiuser Detection Based on Code Mapping (SCM)

In order to get a suboptimal solution, the candidate bits set output from the matched filters mapped to a one-dimensional feature space using a mapping function.

Let

According to (6), if the elements in are all right, the value of will achieve the minimum. Making a partial derivation of (7), we get By expanding (8), we get a th-order linear equations given as follows: Now, we take into account that MAI is the main interference resource which largely affects the performance of the system. Let , . Bringing the candidate codes set into (9), there are two situations illustrated as follows.(1)No wrong code in . Based on the theory of extreme value, if MAI is the only interference resource without AWGN and the elements in are all correct, the result of (9) strictly equals . And, in the condition of high SNR, bringing (4) to , we can see that when there is no error bit in the candidate codes set .(2)Wrong codes exist in . Supposing is the wrong code (in other words, is the correct code), the other codes are correct. Substituting it to the th equation of (9), we get As for which does not equal , we get

According to (10) and (11), it can be seen when the th user’s code is wrong, , . Therefore, the function can obviously differentiate the wrong codes and the right codes through the absolute value of it. In addition, is a th-order linear equation which can get the result of without complex computations.

It is accessible to map into a one-dimensional feature space to identify the wrong codes in the candidate set. Figure 1 shows an example of the feature space mapping in the scenario of 10 users, with 6 dB signal-to-noise ratio (SNR).

In Figure 1, it is clear that the wrong codes and the right ones have a significant difference in the feature space mapped by . Almost all the values of corresponding to the wrong codes are greater than 280; in contrast the values of the right ones are smaller than 280. -means clustering approach [22] is used to classify the candidate codes into right bits and wrong ones. The -means clustering is a popular unsupervised clustering algorithm based on the partition of data, which can finish the classification without training samples.

In conclusion, the whole proposed approach can perform the multiuser detection with 3 steps. First, map the candidate bits set into a one-dimensional feature space by mapping function . Second, aggregate and pick out the wrong bits among the candidate bits set by code clustering. And finally, correct the wrong bits to obtain a suboptimal solution.

#### 3. The Proposed SCM-ABC-MUD Algorithm

##### 3.1. The Basic Principle of ABC Algorithm

In the ABC algorithm, the colony of artificial bees consists of three kinds of bees: employed bees, onlookers, and scouts. In the algorithm, the number of employed bees is equal to the number of food sources around the hive. The employed bee whose food source is exhausted by the employed and onlooker bees becomes a scout. The position of a food source represents a possible solution of the optimization problem, and the nectar amount of a food source corresponds to the quality (fitness) of the associated solution. The number of the onlooker bees or the employed bees is equal to the number of food sources in the population.

The general scheme of the ABC algorithm is as follows.

*Step 1. *The first step is initialization. In this step, a set of food source positions is generated and distributed randomly. After initializing the solution population, the fitness value of each food source position is evaluated. In ABC algorithm, the fitness of each solution is the value of objective function. The ABC has some control parameters: food sources number (the number of food sources equal to the employed bees); limit, the value of predetermined number of cycles; and MCN, the maximum cycle number. Initially, the values of these control parameters are assigned.

*Step 2. *After initialization, the population is evaluated and is subjected to repeated cycles of the search processes of the employed bees, the onlooker bees, and scout bees. Employed bees search for new food sources having more nectar within the neighborhood of the food source in their memory. They find a neighbor food source and then evaluate its profitability (fitness). They can determine a neighbor food source using the formula given by
where is a randomly selected food source, is a randomly chosen parameter index, and is random number between .

*Step 3. * After producing the new food source , its fitness is calculated and a greedy selection is applied between and . If the fitness of the new food source position is better than the old food source position, the employed bee moves from the old food source position to the new food source position, and the new food source takes place of old one in the population and becomes a new member.

The fitness value of the solution, , might be calculated for minimization problems using the following formula:
where is the objective function value of solution .

*Step 4. *Unemployed bees consist of two groups of bees: onlooker bees and scouts. Employed bees share their food source information with onlooker bees waiting in the hive, and then onlooker bees probabilistically choose their food sources depending on the probability values calculated using the fitness values provided by employed bees.

Calculate the probability values for the solutions using fitness of the solutions by
where SN represents the number of the food sources position.

After a food source for an onlooker bee is probabilistically chosen, a neighborhood source is determined by Step 2, and its fitness value is computed. As in Step 3, a greedy selection is applied between and . Hence, more onlookers are recruited to richer sources, and positive feedback behavior appears.

*Step 5. * If a predetermined number of trials cannot further improve a candidate solution represented by a food source then that food source, is considered abandoned and the employed bee associated with that food source becomes a scout. The new solution discovered by the scout can be defined by
where and are the lower and upper bounds of the parameters . The abandoned food source is replaced by the randomly new food source.

*Step 6. * If a termination condition is reached, the process is stopped and memorizes the best solution achieved so far. Otherwise the algorithm returns to Step 2.

The general algorithmic structure of ABC optimization approach can be summarized as follows [23]:(i)*Initialization Phase*(ii)*Repeat* Employed Bees Phase Onlooker Bees Phase Scout Bees Phase Memorize the best solution achieved so far(iii)*Until* (Cycle = Maximum Cycle Number).

##### 3.2. The Discretization of Behavior Models

The mathematical model of OMD is considered as a combinatorial optimization problem, and ABC has a strong global searching capability to solve this problem. The optimization function for OMD is shown as (6), which is a discrete optimization function; for this reason, the behavior models of ABC should be discretized.

The discretization is defined as follows.(1)The expression of artificial bee’s state. In this solution space, the state of each artificial bee is encoded by −1 or . If there are active users in this DS-UWB MA system, thus the state is a -dimensional vector, like, where and .(2)The food quality or the fitness function for artificial bees is the criterion of OMD in (6).(3)is the new food sources for each step; if the element of is, then assign ; otherwise, .(4)Initialization. The initial state of each artificial bee is selected randomly in the discrete space with likely solutions. But the ABC is an iterative optimization algorithm, which means that the selection of initial states has a great effect on the iteration times and the convergence rate. In this paper, we choose a suboptimal multiuser detection based on code mapping (SCM) and its variations as initial state values of artificial bees, which can ensure the artificial bees gather near the optimal value of the optimization problem because the suboptimal solution is quite close to the optimal value in the solution space. Besides, this selection method of initial states can speed up the convergence rate and reduce the iteration times for optimization.

##### 3.3. The Specific Steps of the Initial Value Selection

The specific steps of the initial value selection are given as follows.

*Step 1. *Execute matched filter detection and code mapping to get a suboptimal solution first. Assign the result to the first artificial bee as its initial state value, where and .

*Step 2. *Change an element of the result randomly, , and then assign this new result which changes from to the second artificial bee as its initial state value.

*Step 3. * Repeat Step 2 and assign these new results to other artificial bees.

*Step 4. *If all artificial bees have been assigned initial state values, the procedure of initial value selection comes to the end. And we can start the ABC to research the optimal value for MUD. In consideration of the previous statements, the overall structure of this proposed SCM-ABC-MUD detector is shown in Figure 2.

Figure 2 shows the block diagram of the algorithm. The implementation of this detector can be summarized as follows: firstly, the output of a bank of matched filter receivers is fed to suboptimal detectors based code mapping and clustering; secondly, the detection results of these suboptimal detectors are used to construct an initial solution space; finally, the ABC is executed in this space.

#### 4. Simulation and Discussion

In order to analyze the proposed SCM-ABC-MUD algorithm, Monte Carlo simulations are utilized and the values of these majority parameters are assigned as Table 1.

##### 4.1. The BER Performance versus SNR

The BER versus SNR curves with perfect power control in the AWNG are depicted in Figure 3. And there are 10 users in the system. As for ABC, we fix the number of initializing food sources (equal to employed bees) that is 3; limit, the value of predetermined number of cycles, that is 3; and MCN, the maximum cycle number, that is 20.

The performances of matched filter (MF), decor relating (DEC) [24], minimum mean square error (MMSE) [25], SCM-ABC-MUD, and OMD detectors are compared and depicted in Figure 3.

Figure 3 shows that the BER performance of SCM-ABC-MUD is superior to those of other suboptimal detectors including MF, DEC, and MMSE, and it even coincides with that of OMD. The reason is that this proposed SCM-ABC-MUD algorithm can make a search within a simplified solution space constructed by the solutions of these suboptimal detectors rather than a random search.

##### 4.2. The BER Performance versus User Numbers

The BER performances of these detectors with different number of active users are analyzed in this experiment. The SNR of the AWGN channel is 5 dB. And the control parameters of ABC are same as the BER performance versus SNR. Figure 4 shows the result of this experiment. According to Figure 4, the performance of SCM-ABC-MUD is the best of the suboptimum MUD except OMD. While the number of users increases, ABC needs a new group of control parameters. However, in this experiment, they are unchanged, resulting in the performance difference between SCM-ABC-MUD and OMD.

##### 4.3. The NFE Resistant Capability Comparison

In this experiment, the SNR of the first user’s received signal is assigned at 5 dB all the time, while the SNR of other users changs from 0 dB to 10 dB with per step of 1 dB. Besides, other parameters are set as same as those in the BER performance versus SNR. Figure 5 shows the first user’s BER performances of different MUD detectors. It can be seen from Figure 5 that OMD has the best near-far effect resistant ability, and the SCM-ABC-MUD is very close to OMD.

##### 4.4. BER Performance versus Different Initial States

As an iterative optimization algorithm, the convergence rate is as important as the optimization capability. And the selection of initial states has a great effect on the iteration times and the convergence rate. In this experiment two initial state values of artificial bees are employed as a comparison. One has random initial state values which is named as ABC-MUD; the other is SCM-ABC-MUD which is assigned a group of initial state values using the suboptimal solution of the code mapping-based multiuser detection. The BER performance is studied for both algorithms with the maximum cycle number (MCN) of 5, 15, and 20, respectively. Figures 6 and 7 are the convergence rates of ABC-MUD and SCM-ABC-MUD separately.

From Figures 6 and 7, the BER performance of SCM-ABC-MUD is much better than ABC-MUD with the same iteration times, and the former can achieve OMD’s BER performance with 20 times iteration which is the global optimal solution. It can be concluded that the convergence rate of SCM-ABC-MUD is much quicker than that of ABC-MUD. Meanwhile, ABC-MUD only improves its BER performance a little than matched filter (shown in Figure 3). It is because that SCM-ABC-MUD makes full use of the suboptimal solution, the initial value of SCM-ABC-MUD is more close to OMD than ABC-MUD, and so it can achieve the optimal value of OMD much quicker than ABC-MUD.

##### 4.5. The Computational Complexity of the Proposed SCM-ABC-MUD

OMD can obtain the best BER performance while the computational complexity performance is too expensive to be implemented in practice. However, the computational complexity of SCM-ABC- MUD is much less than that of the OMD. In a -user DS-UWB system, to detect the -user vector , the computational complexity of iterations of the OMD is . The computational complexity of the proposed method includes three parts. The first part is the computational complexity of the code mapping; according to Section 2.2.3, the mapping method is just a calculation of , so the computational complexity of the first part can be neglected. The second part is the computational complexity of -means clustering; the complexity of iterations of the code clustering is . The third part is the complexity of the ABC algorithm. It depends on the convergence rate of SCM-ABC-MUD. In Section 4.4, we have obtained a conclusion that the SCM-ABC-MUD can achieve convergence with a much fewer iterations than OMD. Let the normalized operation time of per vector using matched filter detector equal to 1 in the condition of 10 users. The simulation parameters are the same as Section 4.1. Table 2 lists the relative operation time using OMD, SCM-ABC-MUD, and matched filter.

From Table 2 we can see that the computational complexity of the SCM-ABC-MUD is in the same order of magnitude to the MMSE and DEC and far lower than OMD. This is because the iteration of SCM-ABC-MUD will be converged very soon and costs little quantity of computation. Hence, we can get a conclusion that the SCM-ABC-MUD can get good BER performance with low computational complexity.

#### 5. Conclusions

In this paper, we firstly employed the Artificial Bee Colony algorithm in the DS-UWB MUD. In consideration of the high computational complexity of OMD, the proposed MUD is a hybrid method which combines ABC algorithm and a suboptimal solution of the code mapping-based MUD. First, the bits set output from the matched filters is mapped into a one-dimensional feature space to obtain a suboptimal solution; then the initial solution space is constructed based on the suboptimal solution; finally, the optimal solution is found by operating the different behaviors of artificial bees in solution space. The proposed multiuser detector can make full use of the suboptimal solution and advantages of ABC to study the optimal value in the solution space. Simulation results have indicated that the BER performance, user capacity, and the NFE resistant ability of this novel algorithm are quite close to those of OMD, and they are also superior to those of MF, DEC, and MMSE. Furthermore, the convergence rate of SCM-ABC-MUD is better than that of ABC-MUD. And the computational complexity of the SCM-ABC-MUD is much lower than that of OMD.

#### Acknowledgments

The research in this paper is supported by the National Natural Science Foundation of China (Grant no. 61102084), Foundation of China Academy of Space Technology (CAST), and the China Postdoctoral Science Foundation (Grant no. 2011M500665).

#### References

- M. Z. Win and R. A. Scholtz, “Impulse radio: how it works,”
*IEEE Communications Letters*, vol. 2, no. 2, pp. 36–38, 1998. View at Google Scholar · View at Scopus - X. Shen, M. Guizani, H. H. Chen et al., “Guest editorial ultra-wideband wireless communications-theory and applications,”
*IEEE Journal on Selected Areas in Communications*, vol. 24, no. 4, pp. 713–716, 2006. View at Publisher · View at Google Scholar - J. Ahmadi-Shokouh and R. C. Qiu, “Ultra-wideband (UWB) communications channel measurements—a tutorial review,”
*International Journal of Ultra Wideband Communications and Systems*, vol. 1, no. 1, pp. 11–31, 2009. View at Publisher · View at Google Scholar · View at Scopus - I. Oppermann, M. Hämäläinen, and J. Iinatti, Eds.,
*UWB: Theory and Applications*, Wiley, 2005. - S. Verdu, “Minimum probability of error for asynchronous Gaussian multiple-access channels,”
*IEEE Transactions on Information Theory*, vol. 32, no. 1, pp. 85–96, 1986. View at Google Scholar · View at Scopus - C. Wang, M. Ma, R. Ying et al., “Narrowband interference mitigation in DS-UWB systems,”
*IEEE Signal Processing Letters*, vol. 17, no. 5, pp. 429–432, 2010. View at Publisher · View at Google Scholar · View at Scopus - P. Kaligineedi and V. K. Bhargava, “Frequency-domain turbo equalization and multiuser detection for DS-UWB systems,”
*IEEE Transactions on Wireless Communications*, vol. 7, no. 9, pp. 3280–3284, 2008. View at Publisher · View at Google Scholar · View at Scopus - G. S. Biradar, S. N. Merchant, and U. B. Desai, “Performance of constrained blind adaptive DS-CDMA UWB multiuser detector in multipath channel with narrowband interference,” in
*Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08)*, pp. 1–5, November-December 2008. View at Publisher · View at Google Scholar · View at Scopus - Q. Z. Ahmed and L. L. Yang, “Reduced-rank adaptive multiuser detection in hybrid direct-sequence time-hopping ultrawide bandwidth systems,”
*IEEE Transactions on Wireless Communications*, vol. 9, no. 1, pp. 156–167, 2010. View at Publisher · View at Google Scholar · View at Scopus - M. Woodside-Oriakhi, C. Lucas, and J. E. Beasley, “Heuristic algorithms for the cardinality constrained efficient frontier,”
*European Journal of Operational Research*, vol. 213, no. 3, pp. 538–550, 2011. View at Publisher · View at Google Scholar · View at Scopus - B. Basturk and D. Karaboga, “An artificial bee colony (ABC) algorithm for numeric function optimization,” in
*Proceedings of IEEE Swarm Intelligence Symposium*, pp. 12–14, May 2006. - D. Karaboga and B. Basturk, “A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm,”
*Journal of Global Optimization*, vol. 39, no. 3, pp. 459–471, 2007. View at Publisher · View at Google Scholar · View at Scopus - W. Zou, Y. Zhu, H. Chen et al., “A clustering approach using cooperative artificial bee colony algorithm,”
*Discrete Dynamics in Nature and Society*, vol. 2010, Article ID 459796, 16 pages, 2010. View at Publisher · View at Google Scholar · View at Scopus - Y. Xu, P. Fan, and L. Yuan, “A simple and efficient artificial bee colony algorithm,”
*Mathematical Problems in Engineering*, vol. 2013, Article ID 526315, 9 pages, 2013. View at Publisher · View at Google Scholar - D. Karaboga and B. Akay, “A comparative study of artificial bee colony algorithm,”
*Applied Mathematics and Computation*, vol. 214, no. 1, pp. 108–132, 2009. View at Publisher · View at Google Scholar · View at Scopus - D. Karaboga, B. Akay, and C. Ozturk, “Artificial bee colony (ABC) optimization algorithm for training feed-forward neural networks,” in
*Modeling Decisions for Artificial Intelligence*, pp. 318–329, Springer, Berlin, Germany, 2007. View at Google Scholar - L. P. Wong, M. Y. H. Low, and C. S. Chong, “A bee colony optimization algorithm for traveling salesman problem,” in
*Proceedings of the 2nd Asia International Conference on Modelling and Simulation (AICMS '08)*, pp. 818–823, IEEE, May 2008. View at Publisher · View at Google Scholar · View at Scopus - F. Kang, J. Li, and Q. Xu, “Structural inverse analysis by hybrid simplex artificial bee colony algorithms,”
*Computers and Structures*, vol. 87, no. 13-14, pp. 861–870, 2009. View at Publisher · View at Google Scholar · View at Scopus - D. Karaboga and B. Akay, “A modified artificial bee colony (ABC) algorithm for constrained optimization problems,”
*Applied Soft Computing Journal*, vol. 11, no. 3, pp. 3021–3031, 2011. View at Publisher · View at Google Scholar · View at Scopus - B. Akay and D. Karaboga, “A modified artificial bee colony algorithm for real-parameter optimization,”
*Information Sciences*, vol. 192, pp. 120–142, 2012. View at Publisher · View at Google Scholar · View at Scopus - B. Alatas, “Chaotic bee colony algorithms for global numerical optimization,”
*Expert Systems with Applications*, vol. 37, no. 8, pp. 5682–5687, 2010. View at Publisher · View at Google Scholar · View at Scopus - C. Xu, P. Zhang, B. Li et al., “Vague C-means clustering algorithm,”
*Pattern Recognition Letters*, vol. 34, no. 5, pp. 505–510, 2012. View at Publisher · View at Google Scholar - D. Karaboga, “Artificial bee colony algorithm,”
*Scholarpedia*, vol. 5, no. 3, p. 6915, 2010. View at Publisher · View at Google Scholar - S. Im and E. J. Powers, “An iterative decorrelating receiver for DS-UWB multiple access systems using biphase modulation,” in
*Proceedings of IEEE Workshop on Signal Processing Systems Design and Implementation*, pp. 59–64, October 2004. View at Publisher · View at Google Scholar · View at Scopus - G. C. Chung, “Multi-user access interference suppression for UWB system,” in
*Proceedings of the International Conference on Computer & Information Science (ICCIS '12)*, vol. 2, pp. 670–675, June 2012. View at Publisher · View at Google Scholar