You are on page 1of 6

Recursive blind equalization with an optimal bounding

ellipsoid algorithm
Mathieu Pouliquen, Miloud Frikel, Matthieu Denoual

To cite this version:


Mathieu Pouliquen, Miloud Frikel, Matthieu Denoual. Recursive blind equalization with an optimal
bounding ellipsoid algorithm. 22nd European Signal Processing Conference, Sep 2014, Lisbonne,
Portugal. 2014. <hal-01058949>

HAL Id: hal-01058949


https://hal.archives-ouvertes.fr/hal-01058949
Submitted on 28 Aug 2014

HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est


archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents
entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non,
lished or not. The documents may come from émanant des établissements d’enseignement et de
teaching and research institutions in France or recherche français ou étrangers, des laboratoires
abroad, or from public or private research centers. publics ou privés.
RECURSIVE BLIND EQUALIZATION WITH AN OPTIMAL BOUNDING ELLIPSOID
ALGORITHM

M. Pouliquen, M. Frikel, M. Denoual

GREYC CNRS UMR 6072


ENSICAEN, 06 Bd du Marechal Juin
14050 Caen Cedex, France
mathieu.pouliquen@unicaen.fr

ABSTRACT ular class of recursive algorithms ( [9], [10], [11], [12], [13],
In this paper, we present an algorithm for blind equalization [14]). The proposed approach is based on such algorithms. It
i.e. equalization without training sequence. The proposed is a recursive method with a low computational burden and it
algorithm is based on the reformulation of the equalization is then suitable for real-time application.
problem in a set membership identification problem. Among The paper is organized as follows: in section 2 the channel
the Set Membership Identification methods, the chosen algo- model is described and the problem of blind channel equal-
rithm is an optimal bounding ellipsoid type algorithm. This ization is formulated. Section 3 is devoted to the presentation
algorithm has a low computational burden which allows to of the equalization algorithm: the principle and the algorithm
use it easily in real time. Note that in this paper the equalizer are stated in subsections 3.1 and 3.2, an analysis is provided in
is a finite impulse response filter. An analysis of the algo- 3.3. Section 4 shows simulation results. Section 5 concludes
rithm is provided. In order to show the good performance of the paper.
the proposed approach some simulations are performed.
Index Terms— Blind Equalization, FIR equalizer. 2. PROBLEM FORMULATION

On Fig. 1 {sk } is the input sequence, {xk } is the received


1. INTRODUCTION
sequence given by
The equalization problem is depicted on Fig. 1. It consists ∑
in the estimation of a source sequence from the knowledge xk = hi sk−i + nk
i
of a received output sequence. Two main groups of methods
can be distinguished: equalization with training and equal- where {hi } are the impulse response coefficients which en-
ization without training. The first group needs the use of compasses the effects of the transmitter filter, unknown chan-
training sequences known both to receiver and transmitter. nel and receiver filter. {nk } is an unknown noise sequence,
When it is not practical to use training sequences, the equal- {b
sk } denotes the output of the equalizer.
ization can only be made using the received signal. This cor-
responds to the second group of methods: blind equalization
methods. Blind equalization has received much interest for nk
the last decades as pointed out by the available contributions
✲ +❄ ✲ FIR Equalizer
sk xk sbk
(see [1], [2], [3], [4], [5], [6], [7], [8] and references therein). ✲ Channel ✲
Two specific groups of methods can be roughly distinguished:
(1-) Second-Order Statistics (SOS) methods ( [4], [5] [7]) and source received estimate
(2-) Higher-Order Statistics (HOS) methods ( [2], [3], [8]). In
this paper we proposed a novel approach to blind equalization
for a SISO channel.
The suggested approach is based on one key idea: rewrite Fig. 1. Equalization problem
the equalization problem as an identification problem in pres-
ence of bounded disturbances. Such an identification problem
can be solved using Set Membership Identification methods. The input sequence {sk } is supposed to be unobservable
Among the Set Membership Identification methods, Optimal and the objective in this paper is to propose a blind equaliza-
Bounding Ellipsoid (OBE) algorithms represent a very pop- tion algorithm i.e. an algorithm which allows the estimation
of a deconvolution filter such that the transmitted sequence In the case where the noise can’t be neglected, the output
{sk } can be reconstructed reliably. L

fi xk−i of the filter Fo doesn’t belong to CQAM . A useful
i=0
The proposed algorithm is based on the following usual
elementary property on the output of the deconvolution filter
assumptions:
Fo in a noisy context is provided below.
A.1 The input sequence {sk } is supposed to be independent,
identically distributed;
A.2 The input sequence {sk } is drawn from a QAM constel- Property 1
lation CQAM ; Consider assumptions stated in section 2. If the noise se-
L

A.3 The noise sequence {nk } is supposed to be bounded via quence {nk } satisfies | fi nk−i | < 1 (with Fo defined in
|nk | ≤ δn ; i=0
A.4 Sequences {sk } and {nk } are independent; assumption [A.5]) then we have
A.5 There exists a L order Finite Impulse Response (FIR) de- ( L
)

convolution filter Fo , characterized by a coefficient vector dec fi xk−i = sk (2)
θo , such that if nk = 0 then i=0

L
∑ and ( )
sk = fi xk−i = ϕTk θo L
∑ L

i=0 dec fi xk−i = fi xk−i + vk (3)
i=0 i=0
where
where |vk | ≤ δv with
   
f0 xk
    L

θo =  ...  and ϕk =  ...  δv = |fi |δn < 1 (4)
fL xk−L i=0

Assumption A.5 seems a bit hard nevertheless, due to the fact Proof 1 ∑
that inaccuracy in the modeling can be included in the noise We have xk = hi sk−i + nk and Fo such that
nk , we have observed the algorithm to work well numerous i
L
∑ L

cases where this assumption was not satisfied (this is the case
fi (xk−i − nk−i ) = sk , it follows sk = fi xk−i −
in the example).
i=0 i=0
∑L
In the following we consider the function dec(.) defined fi nk−i . (2) is a consequence of the fact that sk is drawn
by { } i=0
arg min L

dec(y) = z − y (1)
z ∈ CQAM 2 from a QAM constellation and | fi nk−i | < 1. (3) follows
i=0
dec(y) corresponds to the nearest symbol in CQAM from y. L

with vk = − fi nk−i such that |vk | < 1.
i=0
3. EQUALIZATION ALGORITHM
This trivial property is important because this means that
∑L
3.1. Principle
at each time the output fi xk−i of Fo is close to a point
Under assumptions listed in section 2 and in the case where i=0
the noise sequence can be neglected (nk = 0), it is stated which belongs to the constellation and this point corresponds
in [15] that if we estimate a deconvolution filter F , defined by to sk . This is illustrated on Fig. 2 for a 4-QAM modulation.
a coefficient vector θ with the same dimension as θo and such
that the output sbk belongs to CQAM , then there exists n ∈ N The proposed algorithm draws on (3) and (4): its aim is
such that the estimation of a deconvolution filter F such that the output
π
θ = ejn 2 θo sbk belongs to a neighborhood of the QAM constellation. This
corresponds to the estimation of a coefficient vector θ in such
where θo is the equalizer coefficient vector of Fo defined in a way that at each time sbk = ϕTk θ satisfies
assumption [A.5].
sk ) = sbk + ϵk
dec(b
that’s to say ( ) and ϵk/k−1 defined from (6) and (7).
dec ϕTk θ = ϕTk θ + ϵk (5) The two weighting terms are λ and σk . 0 < λ ≤ 1 is the
where |ϵk | ≤ δ with δv ≤ δ < 1. In the case where the forgetting factor fixed by the user to weight the past informa-
noise can be neglected (δv = δ = 0) this corresponds to the tion.
principle stated in [15]. σk is a switching flag designed in the following manner:
 ( ϵk/k−1 )

λ −1
∑L (∑ ) 
 ϕTk P k−1 ϕ k ( δ ) ( )
dec L
fi xk−i 
 if ϵk/k−1 > δ and ϕTk Pk−1 ϕk > 0
i=0 fi xk−i i=0
σk =


 0
 ( ) ( )
✻ ✻ ✻ 
j ❄δv j if ϵk/k−1 ≤ δ or ϕTk Pk−1 ϕk = 0
(10)
✲ ✲ The difference with algorithms proposed in [11], [12] and
1 1 [14] lies in the fact that, here, there is no reference signal. The
proposed equalization algorithm is a decision directed equal-
ization algorithm: the value of dec(ŝk/k−1 ) monitors the al-
gorithm behavior.

3.3. Analysis
L
∑ The algorithm derived in subsection 3.2 is discussed in the
bk =
Fig. 2. s sk ) for a
fi xk−i in a neighborhood of dec(b
present subsection.
i=0
4-QAM modulation
δ is a user defined scalar whose role is described below.
From (10), σk stops the updating of θ̂k if the arrival data are
Problem (5) is similar to an identification problem in pres- meaningless (i.e. ϕTk Pk−1 ϕk = 0). In the following consider
ence of bounded disturbances. In this paper we shall investi- the case where ϕTk Pk−1 ϕk > 0.
gate an OBE type algorithm ( [11], [12], [14]), the reason is
that its computational complexity is low and it is adapted to an From the above expressions the prediction ŝk/k can be
identification problem in presence of bounded disturbances. written as
The algorithm is given in the next subsection. ŝk/k = ŝk/k−1 + ϕTk Γk ϵk/k−1
This gives the following error
3.2. Algorithm
( )
θ̂k represents an estimation of the coefficient vector θ. Let us dec ŝk/k−1 − ŝk/k = (1 − ϕTk Γk )ϵk/k−1
define the a priori and a posteriori predictors as Making use of the expression for Γk , it follows

 ŝk/k−1 = ϕTk θ̂k−1 ( ) λ
(6) dec ŝk/k−1 − ŝk/k = ϵk/k−1
 λ + ϕTk Pk−1 ϕk σk
ŝk/k = ϕTk θ̂k
and their corresponding errors Two possible cases arise.

 • If ϵk/k−1 > δ, then using the value of σk yields
 ϵk/k−1 = dec(ŝk/k−1 ) − ŝk/k−1
(7) ( ) ϵk/k−1
 dec ŝk/k−1 − ŝk/k = ϵk/k−1
ϵk/k = dec(ŝk/k ) − ŝk/k
δ
The equalization algorithm corresponds to an improved This gives
weighted recursive least square algorithm. Its update equation ( )
for θ̂k is as follows dec ŝk/k−1 − ŝk/k = δ

θ̂k = θ̂k−1 + Γk ϵk/k−1 (8) ( ) ( )


We have δ < 1 consequently dec ŝk/k = dec ŝk/k−1
with and then we get


 Γk =
Pk−1 ϕk σk ( )
λ+ϕT
k Pk−1 ϕk σk
dec ŝk/k − ŝk/k = δ
(9)

 P −1 = λP −1 + ϕ σ ϕT
k k−1 k k k

• If ϵk/k−1 ≤ δ then σk = 0 thus the adaptation is frozen:
2

θ̂k = θ̂k−1 1.5

( ) ( )
It follows that ŝk/k = ŝk/k−1 and dec ŝk/k = dec ŝk/k−1 1

then we get
( ) 0.5
dec ŝk/k − ŝk/k ≤ δ

imaginary
0

This clearly shows that, via the weighting term σk , the −0.5

proposed algorithm ensures the following property:


−1

∀k such that ϕTk Pk−1 ϕk > 0 ; |ϵk/k | ≤ δ (11) −1.5

Consequently δ is a chosen bound on the a posteriori error −2


−2 −1.5 −1 −0.5 0 0.5 1 1.5 2
ϵk/k . This means that, for δ < 1, the output of the deconvo- real

lution filter belongs to a neighborhood of the QAM constella-


tion. This neighborhood is defined by the bound δ.
The choice of the threshold δ determines the ability to Fig. 4. First simulation: constellation of ŝk/k
reach a deconvolution filter F such that the transmitted se-
quence {sk } can be reconstructed reliably. From (4) this
threshold depends on Fo and on δn : QAM modulation case and a channel described by the fol-
lowing filter:
δv ≤ δ < 1 (12)
H(z) = −1.666 + 0.175 ∗ j + (0.288 + 0.726 ∗ j)z −1
L
∑ + (1.191 + 2.183 ∗ j)z −2 + (−0.038 + 0.114 ∗ j)z −3
with δv = |fi |δn .
i=0 In each experiment the order of the equalizer filter is L = 15.
An underestimation of the bound δ is in contradiction with The forgetting factor λ has been chosen equal to 0.99 in order
condition (12) while with an overestimation the convergence to reduce the impact of bad initial conditions and the threshold
may be slower. In section 4, simulation experiments are per- δ has been chosen equal to 0.99.
formed with δ = 0.99. {nk } is a white noise uniformly distributed with |nk | ≤
δn where δn is adjusted to have a desired Signal to Noise
0
10 Ratio (SNR). The proposed blind equalization algorithm has
been tested on the basis of Monte Carlo simulations of 100
experiments.
In a first simulation, we have investigated the influence
−1
10
of the data-set size N in the equalization accuracy. Here
SNR= 20dB and N varied from 200 to 4000. The Sym-
SER

bol Error Ratio (SER) is depicted in Fig. 3 as a function of


N . It appears an important improvement of performance as
−2
N grows until N = 3000.
10
Fig. 4 shows the constellation of ŝk/k for N = 2000.
Each point is in a neighborhood of the 4-QAM constellation.
0 500 1000 1500 2000 2500 3000 3500 4000 In the beginning, points are on boundaries, then after several
N
iterations they converge inside constellation circles.
In a second simulation, the number of available data was
Fig. 3. First simulation: SER for various data set size from N = 2000 and SNR varied from 5dB to 30dB. We compared
100 Monte Carlo simulations the proposed method against two methods:
• the Constant Modulus Algorithm (CMA) proposed in [2];
• the Stochastic gradient algorithm (SQD) proposed in [6].
4. SIMULATION RESULTS Fig. 5 shows SER curves as a function of SNR. We observe
that the proposed algorithm enhances performance of CMA
In this section, different simulations are reported to illustrate and SQD for high and low SNR. Let us remark that the com-
performance of the proposed method. We consider the 4- putational time of the proposed method is less than 1s which
0
10
a time domain approach,” IEEE Transactions on Infor-
mation Theory, vol. 40, no. 2, pp. 340–349, 1994.
[5] E. Moulines, P. Duhamel, J.F. Cardoso, and S. Mayrar-
gue, “Subspace methods for the blind identification of
multichannel FIR filters,” IEEE Transactions on Signal
log10(SER)

−1
10 Processing, vol. 43, no. 2, pp. 516–525, 1995.
[6] M. Lazaro, I. Santamaria, D. Erdogmus, K.E. Hild,
C. Pantaleon, and J.C. Principe, “Stochastic blind
CMA equalization based on pdf fitting using parzen estima-
−2
10
SQD tor,” IEEE Transactions on Signal Processing, vol. 53,
Proposed algorithm no. 2, pp. 696–704, 2005.
5 10 15 20 25 30
SNR(dB) [7] K.I. Diamantaras and T. Papadimitriou, “An efficient
subspace method for the blind identification of multi-
Fig. 5. Second simulation: SER obtained with 3 approaches channel FIR systems,” IEEE Transactions on Signal
for various levels of noise and from 100 Monte Carlo simula- Processing, vol. 56, no. 12, pp. 5833–5839, 2008.
tions [8] S. Abrar and A.K. Nandi, “Blind equalization of
square-QAM signals: a multimodulus approach,” IEEE
Transactions on Communications, vol. 58, no. 6, pp.
demonstrates the low computational burden of the proposed 1674–1685, 2010.
method. [9] E. Fogel and Y.F. Huang, “On the value of information
in system identification - bounded noise case,” Auto-
5. CONCLUSION matica, vol. 18, no. 2, pp. 229–238, 1982.
[10] S. Dasgupta and Y-F Huang, “Asymptotically con-
In this paper we have investigated the blind channel equal- vergent modified recursive least square with data-
ization problem. It is shown that this problem can be written dependent updating and forgetting factor for systems
as an identification problem in presence of bounded distur- with bounded noise,” IEEE Transactions on Informa-
bances. The proposed algorithm is based on a particular type tion Theory, vol. 33, no. 3, pp. 383–392, 1987.
of ellipsoidal algorithms: OBE type algorithms. One impor-
tant contribution of this paper is the fact that few parameters [11] C. Canudas-De-Wit and J. Carrillo, “A modified EW-
have to be chosen (the forgetting factor λ and the bound δ) RLS algorithm for systems with bounded noise,” Auto-
and systematic rules for their selection are provided. Simu- matica, vol. 26, no. 3, pp. 599–606, 1990.
lation results have demonstrated that the algorithm performs [12] G. Tan, C. Wen, and Y.C. Soh, “Identification for sys-
better than some algorithms proposed in literature. In terms tems with bounded noise,” IEEE Transactions on Auto-
of future research, we believe that the proposed algorithm can matic Control, vol. 42, no. 7, pp. 998–1001, 1997.
be extended to other equalizer structures (such as infinite im- [13] M. Boutayeb, Y. Becis, and M. Darouach, “Recur-
pulse response representation) or to MIMO channel. sive identification of linear multivariable systems with
bounded disturbances,” 15th IFAC World Congress-
REFERENCES Barcelona, 2002.
[14] M. Pouliquen, E. Pigeon, and O. Gehan, “Output er-
[1] Y. Sato, “A method of self-recovering equalization for
ror identification for multi-input multi-output systems
multilevel amplitude-modulation,” IEEE Transactions
with bounded disturbances,” 50th IEEE Conference on
on Communications, vol. 23, no. 6, pp. 679–682, 1975.
Decision and Control-Orlando, 2011.
[2] D.N. Godard, “Self-recovering equalization and carrier
[15] A. Benveniste, M. Goursat, and G. Ruget, “Robust
tracking in twodimensional data communication sys-
identification of a nonminimum phase system: blind
tems,” IEEE Transactions on Communications, vol. 28,
adjustement of a linear equalizer in data communica-
no. 11, pp. 1867–1875, 1980.
tions,” IEEE Transactions on Automatic Control, vol.
[3] J. Treichler and B. Agee, “A new approach to multipath 25, no. 3, pp. 385–399, 1980.
correction of constant modulus signals,” IEEE Transac-
tions on Acoustics, Speech and Signal Processing, vol.
31, no. 2, pp. 459–472, 1983.
[4] L. Tong, G. Xu, and T. Kailath, “Blind identifica-
tion and equalization based on second-order statistics:

You might also like