Professional Documents
Culture Documents
ellipsoid algorithm
Mathieu Pouliquen, Miloud Frikel, Matthieu Denoual
ABSTRACT ular class of recursive algorithms ( [9], [10], [11], [12], [13],
In this paper, we present an algorithm for blind equalization [14]). The proposed approach is based on such algorithms. It
i.e. equalization without training sequence. The proposed is a recursive method with a low computational burden and it
algorithm is based on the reformulation of the equalization is then suitable for real-time application.
problem in a set membership identification problem. Among The paper is organized as follows: in section 2 the channel
the Set Membership Identification methods, the chosen algo- model is described and the problem of blind channel equal-
rithm is an optimal bounding ellipsoid type algorithm. This ization is formulated. Section 3 is devoted to the presentation
algorithm has a low computational burden which allows to of the equalization algorithm: the principle and the algorithm
use it easily in real time. Note that in this paper the equalizer are stated in subsections 3.1 and 3.2, an analysis is provided in
is a finite impulse response filter. An analysis of the algo- 3.3. Section 4 shows simulation results. Section 5 concludes
rithm is provided. In order to show the good performance of the paper.
the proposed approach some simulations are performed.
Index Terms— Blind Equalization, FIR equalizer. 2. PROBLEM FORMULATION
L
∑ and ( )
sk = fi xk−i = ϕTk θo L
∑ L
∑
i=0 dec fi xk−i = fi xk−i + vk (3)
i=0 i=0
where
where |vk | ≤ δv with
f0 xk
L
∑
θo = ... and ϕk = ... δv = |fi |δn < 1 (4)
fL xk−L i=0
Assumption A.5 seems a bit hard nevertheless, due to the fact Proof 1 ∑
that inaccuracy in the modeling can be included in the noise We have xk = hi sk−i + nk and Fo such that
nk , we have observed the algorithm to work well numerous i
L
∑ L
∑
cases where this assumption was not satisfied (this is the case
fi (xk−i − nk−i ) = sk , it follows sk = fi xk−i −
in the example).
i=0 i=0
∑L
In the following we consider the function dec(.) defined fi nk−i . (2) is a consequence of the fact that sk is drawn
by { } i=0
arg min L
∑
dec(y) = z − y (1)
z ∈ CQAM 2 from a QAM constellation and | fi nk−i | < 1. (3) follows
i=0
dec(y) corresponds to the nearest symbol in CQAM from y. L
∑
with vk = − fi nk−i such that |vk | < 1.
i=0
3. EQUALIZATION ALGORITHM
This trivial property is important because this means that
∑L
3.1. Principle
at each time the output fi xk−i of Fo is close to a point
Under assumptions listed in section 2 and in the case where i=0
the noise sequence can be neglected (nk = 0), it is stated which belongs to the constellation and this point corresponds
in [15] that if we estimate a deconvolution filter F , defined by to sk . This is illustrated on Fig. 2 for a 4-QAM modulation.
a coefficient vector θ with the same dimension as θo and such
that the output sbk belongs to CQAM , then there exists n ∈ N The proposed algorithm draws on (3) and (4): its aim is
such that the estimation of a deconvolution filter F such that the output
π
θ = ejn 2 θo sbk belongs to a neighborhood of the QAM constellation. This
corresponds to the estimation of a coefficient vector θ in such
where θo is the equalizer coefficient vector of Fo defined in a way that at each time sbk = ϕTk θ satisfies
assumption [A.5].
sk ) = sbk + ϵk
dec(b
that’s to say ( ) and ϵk/k−1 defined from (6) and (7).
dec ϕTk θ = ϕTk θ + ϵk (5) The two weighting terms are λ and σk . 0 < λ ≤ 1 is the
where |ϵk | ≤ δ with δv ≤ δ < 1. In the case where the forgetting factor fixed by the user to weight the past informa-
noise can be neglected (δv = δ = 0) this corresponds to the tion.
principle stated in [15]. σk is a switching flag designed in the following manner:
( ϵk/k−1 )
λ −1
∑L (∑ )
ϕTk P k−1 ϕ k ( δ ) ( )
dec L
fi xk−i
if ϵk/k−1 > δ and ϕTk Pk−1 ϕk > 0
i=0 fi xk−i i=0
σk =
0
( ) ( )
✻ ✻ ✻
j ❄δv j if ϵk/k−1 ≤ δ or ϕTk Pk−1 ϕk = 0
(10)
✲ ✲ The difference with algorithms proposed in [11], [12] and
1 1 [14] lies in the fact that, here, there is no reference signal. The
proposed equalization algorithm is a decision directed equal-
ization algorithm: the value of dec(ŝk/k−1 ) monitors the al-
gorithm behavior.
3.3. Analysis
L
∑ The algorithm derived in subsection 3.2 is discussed in the
bk =
Fig. 2. s sk ) for a
fi xk−i in a neighborhood of dec(b
present subsection.
i=0
4-QAM modulation
δ is a user defined scalar whose role is described below.
From (10), σk stops the updating of θ̂k if the arrival data are
Problem (5) is similar to an identification problem in pres- meaningless (i.e. ϕTk Pk−1 ϕk = 0). In the following consider
ence of bounded disturbances. In this paper we shall investi- the case where ϕTk Pk−1 ϕk > 0.
gate an OBE type algorithm ( [11], [12], [14]), the reason is
that its computational complexity is low and it is adapted to an From the above expressions the prediction ŝk/k can be
identification problem in presence of bounded disturbances. written as
The algorithm is given in the next subsection. ŝk/k = ŝk/k−1 + ϕTk Γk ϵk/k−1
This gives the following error
3.2. Algorithm
( )
θ̂k represents an estimation of the coefficient vector θ. Let us dec ŝk/k−1 − ŝk/k = (1 − ϕTk Γk )ϵk/k−1
define the a priori and a posteriori predictors as Making use of the expression for Γk , it follows
ŝk/k−1 = ϕTk θ̂k−1 ( ) λ
(6) dec ŝk/k−1 − ŝk/k = ϵk/k−1
λ + ϕTk Pk−1 ϕk σk
ŝk/k = ϕTk θ̂k
and their corresponding errors Two possible cases arise.
• If ϵk/k−1 > δ, then using the value of σk yields
ϵk/k−1 = dec(ŝk/k−1 ) − ŝk/k−1
(7) ( ) ϵk/k−1
dec ŝk/k−1 − ŝk/k = ϵk/k−1
ϵk/k = dec(ŝk/k ) − ŝk/k
δ
The equalization algorithm corresponds to an improved This gives
weighted recursive least square algorithm. Its update equation ( )
for θ̂k is as follows dec ŝk/k−1 − ŝk/k = δ
( ) ( )
It follows that ŝk/k = ŝk/k−1 and dec ŝk/k = dec ŝk/k−1 1
then we get
( ) 0.5
dec ŝk/k − ŝk/k ≤ δ
imaginary
0
This clearly shows that, via the weighting term σk , the −0.5
−1
10 Processing, vol. 43, no. 2, pp. 516–525, 1995.
[6] M. Lazaro, I. Santamaria, D. Erdogmus, K.E. Hild,
C. Pantaleon, and J.C. Principe, “Stochastic blind
CMA equalization based on pdf fitting using parzen estima-
−2
10
SQD tor,” IEEE Transactions on Signal Processing, vol. 53,
Proposed algorithm no. 2, pp. 696–704, 2005.
5 10 15 20 25 30
SNR(dB) [7] K.I. Diamantaras and T. Papadimitriou, “An efficient
subspace method for the blind identification of multi-
Fig. 5. Second simulation: SER obtained with 3 approaches channel FIR systems,” IEEE Transactions on Signal
for various levels of noise and from 100 Monte Carlo simula- Processing, vol. 56, no. 12, pp. 5833–5839, 2008.
tions [8] S. Abrar and A.K. Nandi, “Blind equalization of
square-QAM signals: a multimodulus approach,” IEEE
Transactions on Communications, vol. 58, no. 6, pp.
demonstrates the low computational burden of the proposed 1674–1685, 2010.
method. [9] E. Fogel and Y.F. Huang, “On the value of information
in system identification - bounded noise case,” Auto-
5. CONCLUSION matica, vol. 18, no. 2, pp. 229–238, 1982.
[10] S. Dasgupta and Y-F Huang, “Asymptotically con-
In this paper we have investigated the blind channel equal- vergent modified recursive least square with data-
ization problem. It is shown that this problem can be written dependent updating and forgetting factor for systems
as an identification problem in presence of bounded distur- with bounded noise,” IEEE Transactions on Informa-
bances. The proposed algorithm is based on a particular type tion Theory, vol. 33, no. 3, pp. 383–392, 1987.
of ellipsoidal algorithms: OBE type algorithms. One impor-
tant contribution of this paper is the fact that few parameters [11] C. Canudas-De-Wit and J. Carrillo, “A modified EW-
have to be chosen (the forgetting factor λ and the bound δ) RLS algorithm for systems with bounded noise,” Auto-
and systematic rules for their selection are provided. Simu- matica, vol. 26, no. 3, pp. 599–606, 1990.
lation results have demonstrated that the algorithm performs [12] G. Tan, C. Wen, and Y.C. Soh, “Identification for sys-
better than some algorithms proposed in literature. In terms tems with bounded noise,” IEEE Transactions on Auto-
of future research, we believe that the proposed algorithm can matic Control, vol. 42, no. 7, pp. 998–1001, 1997.
be extended to other equalizer structures (such as infinite im- [13] M. Boutayeb, Y. Becis, and M. Darouach, “Recur-
pulse response representation) or to MIMO channel. sive identification of linear multivariable systems with
bounded disturbances,” 15th IFAC World Congress-
REFERENCES Barcelona, 2002.
[14] M. Pouliquen, E. Pigeon, and O. Gehan, “Output er-
[1] Y. Sato, “A method of self-recovering equalization for
ror identification for multi-input multi-output systems
multilevel amplitude-modulation,” IEEE Transactions
with bounded disturbances,” 50th IEEE Conference on
on Communications, vol. 23, no. 6, pp. 679–682, 1975.
Decision and Control-Orlando, 2011.
[2] D.N. Godard, “Self-recovering equalization and carrier
[15] A. Benveniste, M. Goursat, and G. Ruget, “Robust
tracking in twodimensional data communication sys-
identification of a nonminimum phase system: blind
tems,” IEEE Transactions on Communications, vol. 28,
adjustement of a linear equalizer in data communica-
no. 11, pp. 1867–1875, 1980.
tions,” IEEE Transactions on Automatic Control, vol.
[3] J. Treichler and B. Agee, “A new approach to multipath 25, no. 3, pp. 385–399, 1980.
correction of constant modulus signals,” IEEE Transac-
tions on Acoustics, Speech and Signal Processing, vol.
31, no. 2, pp. 459–472, 1983.
[4] L. Tong, G. Xu, and T. Kailath, “Blind identifica-
tion and equalization based on second-order statistics: