Skip to main content

Adaptive primary user's signal detection algorithm based on matrix accumulation estimation for cognitive radio


In this article, a new adaptive primary user's signal detection algorithm for cognitive radio, which integrates frequency-domain block adaptive filtering with a matrix accumulation estimation, is presented with detailed description' of the concept and process of the algorithm. Then, the performance of the algorithm is analyzed and compared by simulation according to the practical requirement of cognitive radio. The result shows that the proposed detection algorithm can detect weak signals quickly and effectively with higher detection probability.

1. Introduction

The cognitive radio [15] can sense and recognize the changes of the electromagnetic environment and borrow a spectrum-hole to transmit information in real-time manner without bringing about any interference to primary users and other users around. It must release the "borrowed" channels and switch to the next spectrum-hole as soon as primary users appear. The cognition must run through the whole communication process. The chief task of cognitive radio is to scout and determine the spectrum-hole, that is, cognitive radio should have the ability of detecting weak primary user signals from strong background noise [68].

Since the digital filters was presented, the adaptive filters technology especially the adaptive least mean square (LMS) filters have been applied widely in scientific and technological domains such as communication systems and signal processing systems. Among the adaptive filters, the adaptive block LMS filters [911] is an more efficient and faster scheme to detect signals in background noise. The latest research findings shows the adaptive block filters provide almost the same mean-square-error as the recursive least squares adaptive filter and possesses a superior convergence rate than the conventional LMS and the normalized LMS filters [12, 13]. The block LMS adaptive filter processes data on a block-by-block basis, as opposed to a sample-by-sample basis. Chia-Chang Hu and his collaborators presented an adaptive block DFT-LMS filter to detect users' signals in the impulse radio ultra-wideband (IR-UWB) systems in [12]. Based on the LMS method, Atrouz adopted the partial adaptive scheme and the block processing to complete the jammers cancellation in paper [13]. From the results of the two papers mentioned above, both algorithms will be difficult to accomplish the target under -1.2 dB SINR.

Our application scene is GSM mobile system, the aim of the research project is to detect the GMSK mobile signal, find out the idle time slot and borrow it to communicate among the cognitive transceivers. The SNR is about -5 dB by actual measuring because of the adjacent channel interferences, the co-channel interferences and the SNR walls effect. It's obvious that the algorithms mentioned above will be difficult to detect the weak primary user's signal from the strong background noise, and the probability of these detections will be low in low SNR or boundary detection. How to improve the detection probability and detect the primary user's signal is our chief task.

Because of its low computational complexity and good convergence property, the block-FFT adaptive filtering algorithm is adopted by our new adaptive detection algorithm of the primary user's signal, which is proposed on basis of the matrix accumulation estimation to overcome further the shortcoming of the above-mentioned algorithms.

2. Adaptive detection algorithm of the primary user's signal

The application scene is the mobile wireless environment. As known to all, the idle rate of time-slots is up to 60% in GSM mobile system at non-dense district or non-dense time. How to use the idle time-slots sufficiently is a interesting topic especially to spectrum resource deficiency nowadays. Our objective lies to detect and use the idle time-slots by cognitive technology. The cognitive radio equipments have multiplex signal detection channels in our design as Figure 1.

Figure 1
figure 1

The principle block diagram of the cognitive radio equipment.

In Figure 1, RF Rx. represents the RF receiver channel, which is designed to detect the weak primary user's signal with the A/D module and the digital signal processor. And RF Trans. stands for the RF transmitter channel, which is designed to communicate with other cognitive radio equipments. Each detection channel of the cognitive radio equipments begins to detect the weak primary user's signal in the frequency-bandwidth assigned by the digital signal processor after startup. Then the idle spectrum is collected as the spectrum-holes. According to stipulation regulation, the cognitive radio equipments may communication between spectrum-holes detected. The detection processing runs through the whole communication process. Being confined to the length of the paper, we will only discuss the weak primary user's signal detection algorithm in detail in the paper.

In most cases, the rate of fading processing is slower than the symbol rate of the signal in GSM mobile system, so the Rice amplitude fading model is adopted in algorithm simulation in view of the existence of the multipath signals. The binary hypothesis is used to test the algorithm as follows.

x ( t ) = n ( t ) , H 0 h ( t ) s ( t ) + n ( t ) , H 1

where, x(t) is the signal received by the cognitive users, and s(t) is the signal sent by the primary users. h(t) is the channel fading coefficient, its probability density function is. p ( r ) = r σ 2 exp ( - r 2 σ 2 ) ( 0 r ) 0 r < 0 . n(t) is the noise. H0 indicates the absence of the primary users, and H1 indicates the existence of the primary users.

Figure 2 shows the process of our new adaptive detection algorithm to the primary user's signal which is performed in digital signal processor, where BFFTAA is the abbreviation of the Block-FFT adaptive filter algorithm. The MAE represents the matrix accumulation estimation, The new algorithm adopts the speediness and degrading-noise advantage of the BFFTAA and the MAE, and is named BFFTAA-MAE algorithm for brevity.

Figure 2
figure 2

The process of adaptive spectrum-hole detection algorithm.

2.1 The block-FFT adaptive filtering algorithm

x(n) is the discrete time data of x(t), and is divided into M segments in BFFTAA-MAE algorithm, and each segment has N samples. N is the number of the filter tap coefficients. In order to express our viewpoint, the iteration equation of the k-th block data is given as following.

W ( k + 1 ) = W ( k ) + u i = 0 N - 1 e ( k N + i ) X ( k N + i ) = W ( k ) - 1 2 u ( k )


y ( k N + i ) = W T ( k ) X ( k N + i ) i = 0 , 1 , , N - 1

where k is the index of the k-th block data, y(kN + i) is the time-domain output of the LMS filters at the k-th block data, and w(k) is the weight coefficients vector of the filters corresponding to the k-th block data.

W ( k ) = [ w 0 ( k ) w 1 ( k ) w N - 1 ( k ) ] T

and X(n) in Equation (2) is the up-to-date N samples of the filter input at the n-th instant, which is also regarded as the output of the delay line with N taps.

X ( n ) = [ x ( n ) x ( n - 1 ) x ( n - N + 1 ) ] T

e(n) is the error sequence in Equation (2), which equals the difference between the expected response d(n) and the output of the filter y(n) as Equation (6), and u is the update step of the weight coefficient.

e ( n ) = d ( n ) - y ( n )

Because of the GSM mobile application scene, the expected response d(n) may be regarded deterministic. The GMSK signal is adopted as the expected primary user's signal d(n) in subsequent simulation.

On the strength of derivation above, the BFFTAA algorithm is presented hither. In order to reduce the computational complexity of BFFTAA, the overlapped reservation algorithm is adopted in frequency-domain with 50% data overlapped reservation. The overlapped reservation algorithm also increases the efficiency of the primary user's signal detection algorithm afterwards. The discrete FFT is performed with N samples per segment, meanwhile the weight coefficients are replaced according to the accumulation result of the error sequence.

The concrete process is to insert N zeros at the tail of w(k) firstly, then to perform 2N-FFT to obtain the weight coefficients vector of the frequency-domain filtering as follows.

[ W k ( f ) ] T = F F T [ W T ( k ) 0 0 ]

where, wk (f) is a 2N × 1 vector of the k-th block data, and the length of vector in frequency-domain is twice than the length of vector in time-domain.

Then Xk (f) is obtained firstly by performing 2N-FFT to (k - 1)-th data block and k-th data block, and diagonalizing the result of FFT as Equation (8)

X k ( f ) = d i a g { F F T [ x ( k N - N ) x ( k N - 1 ) x ( k N ) x ( k N + N - 1 ) ] }

Finally the result of the BFFTAA algorithm is the last N items of the Equation (9):

Y k ( f ) = [ Y 0 k ( f ) , Y 1 k ( f ) , , Y N - 1 k ( f ) ] T = [ X k ( f ) W k ( f ) ] T h e l a s t N i t e m s

2.2 Matrix accumulation estimation

Although the BFFTAA algorithm reduces the computation complexity, it does not improve the detection performance. In order to improve the detection performance, the matrix accumulation estimation (MAE) is integrated with the BFFTAA as a whole.

Yk (f) firstly is conjugated, then a N × N Hankel matrix is reshaped as follows.

B k ( f ) = Y 0 k ( f ) Y 1 k ( f ) Y N - 1 k ( f ) Y 1 k ( f ) Y 2 k ( f ) Y 0 k ( f ) Y N - 1 k ( f ) Y 0 k ( f ) Y N - 2 k ( f )

Then Ck (f) is obtained by a matrix accumulation calculation as Equation (11)

C k ( f ) = [ Y k ( f ) ] T [ Y k ( f ) ]

After completing the above processing, we define a matrix called Sk (f):

S k ( f ) = [ S 0 , 0 k ( f ) S 0 , 1 k ( f ) S 0 , N 1 k ( f ) S 1 , 0 k ( f ) S 1 , 1 k ( f ) S 1 , N 1 k ( f ) S N 1 , 0 k ( f ) S N 1 , 1 k ( f ) Y N 1 , N 1 k ( f ) ]

The matrix multiplication estimation is performed as Equation (13).

S k ( f ) = C k ( f ) × B k ( f ) = { [ Y k ( f ) ] T [ Y k ( f ) ] } × [ Y 0 k ( f ) Y 1 k ( f ) Y N 1 k ( f ) Y 1 k ( f ) Y 2 k ( f ) Y 0 k ( f ) Y N 1 k ( f ) Y 0 k ( f ) Y N 2 k ( f ) ]

Equation (13) has the similar expression to the higher accumulation statistic estimation [14].

S k ( f ) ~ Y k ( λ 1 ) Y k ( λ 2 ) [ Y k ( λ 1 + λ 2 ) ] *

The essence of the Equation (13) is to calculate a matrix about third-order accumulation statistic. The third-order matrix product is computed in the algorithm. The cumulant is a valid method to suppress the noise [15, 14], so the noise will be further suppressed in the algorithm, and the SNR will be raised correspondingly. The subsequent simulation will verify our viewpoint.

Then the accumulated product S ^ is acquired by frequency-domain smoothing to Sk (f). Its essence is to execute two dimensional convolution to Sk (f) with F(m, n). The elements of F(m, n)will be obtained as Equation (15).

F ( m , n ) = 3 π 3 [ 1 - m 2 + n 2 + m n N 2 ]

where F(m, n)is a Rao-Gabr window [15], and m 2 + n 2 +mn F ( m , n ) 2 ( N 2 ) 2 (m, n) G, G is the sets of sampling points.

Finally, Ŝ , which is the estimated value of the accumulated product S ^ , is derived by operation of Mod as Equation (16).

Ŝ = 1 M k = 1 M ( 1 N i = 0 N - 1 | S ^ | )

2.3 The weight-coefficient update

According to the above result, the weight-coefficient update and the primary user's signal detection are calculated in the meantime in the subsequent process.

FFT of the error sequence is transformed as Equation(17).

E k ( f ) = FFT [ 0 0 ( d ( k N ) - y ( k N ) ) ( d ( k N + N - 1 ) - y ( k N + N - 1 ) ) ]

Then, the gradient is obtained by extracting the N items of Equation(18).

( k ) = - 2 FF T - 1 [ X * ( k ) E ( k ) ]

Finally, the weight-coefficient update formula is gained as follows:

W k ( f + 1 ) = W k ( f ) + 1 2 u FFT ( k ) 0 0

Then Sk (f) will be updated in the wake of the iteration and renewal to the parameters and data mentioned above.

2.4 Detection determination of the primary user's signal

The spectral components have a homogeneous distribution in frequency domain after denoising with the adaptive detection algorithm. Taking into account the protection band between authorized frequency-bands, the noise level may be estimated in upper protection band or lower protection band beyond the frequency-band to be detected. In accordance with the Equation(16), Ŝ P B is calculated by the BFFTAA-MAE algorithm to the data sampled in the protection band.

Then Ŝ I B is calculated with the data sampled in-band according to the Equation (16). Ŝ P B is defined as the determination threshold. While, Ŝ I B Ŝ P B the H1 hypothesis is true, and the primary users is supposed to exist. Otherwise H0 is accepted, and the processed data is decided as noise. The empirical value of Ŝ I B is often 0.5 dB greater than Ŝ P B in order to constrain noise better, that's to say, Ŝ I B Ŝ P B +0.5. But the adjusted value cannot be set too great in case the process loses the superabundance information of the primary users.

According to the determination, the cognitive equipments will detect the primary user's signal, and may communicate through the idle channels.

3. Simulation and performance analysis of the algorithm

Both the adaptive filtering and the multiple matrix accumulative algorithm are efficient means to overcome the strong background noise. The major advantage of the algorithm lies in its constant false alarm rate. The Monte Carlo is adopted in simulation. The signals of the primary users are supposed to be the GMSK baseband modulating signal of the GSM mobile system. There are eight time-slots with different normal train sequence in a normal frame, and each time-slot has 156.25 bits. The eight normal train sequences of the GSM mobile system are applied to format the baseband data of the primary user according the GSM standard. For example, the data of the primary user, which is supposed to be detected in our algorithm, is given as Figure 3. Where the train sequence of the primary user is 00101101110111100010110111, and the 57 information bits, 3 trail bits, and 8.25 guard bits are generated by random generator. The d(n) is certainly obtained with the same train sequence. The 26 bits of d(n) is used to track and converge the primary signal. In simulation, other seven bursts are continuous to transmit the data according to the different normal train sequences except the train sequence mentioned above. Meanwhile the data of the primary user, which will be detected, is transmitted now and then. That's to say, the primary user is exit while the data of the primary user is transmitted, otherwise the primary user is absent.

Figure 3
figure 3

The baseband data of the signal.

In order to ensure get the whole data of eight time-slots and better simulation result, the data with 8,192 points is adapted in the simulation. Meanwhile in order to reduce the computational complexity and raise the computational speed, the data is divided into 32 blocks for overlapped reservation, and each segment has 64 points. It is well known that the computation burden will obviously increase if the length of the Rao-Gabr window is selected too long, and the effect will be bad if the length of the Rao-Gabr window is selected too short. It is acceptable that the length of the Rao-Gabr window is (7,7) according to the result of simulation. The range of μ is from 0 to 1. The constringency rate will be reduced if μ is set too big. It can meet the real-time of the algorithm that μ is set as 0.01 according to the result of simulation. SNR is set from -10 dB to 10 dB, and the white noise is adapted in the simulation. Without loss of generality, the Rice amplitude fading model is applied in simulation.

In order to illustrate the superiority of the BFFTAA-MAE detection, the block DFT filters detection [9] and the block LMS detection [10] are compared by computer simulation under the same condition at the same time. Being confined to the length of the paper, we only compared such three algorithms. We find that -5.8 dB is the performance watershed of these algorithms in the simulation, so -5.8 dB SNR will be applied while we analyze the performance of these algorithms.

Firstly, we get the spectral-peak figures of three algorithms mentioned above at -5.8 dB SNR. CSI means comparative signal intensity in Figures 4, 5 and 6. f 1 and f 2 are frequency components (in kHz). Figure 4 is the spectral peak of the block DFT filters detection, and Figures 5 and 6 are the spectral peak corresponding to the block LMS detection and the BFFTAA-MAE detection. From Figures 4 and 6, we can find that the block DFT filters detection algorithm and the block LMS detection algorithm will lose their detection capability under the low SNR condition, and the BFFTAA-MAE detection algorithm will keep better detection capability at the same SNR. Due to adapting the block-FFT adaptive filter algorithm and matrix accumulative algorithm to suppress noise, the BFFTAA-MAE detection algorithm can detect the weak signal more effectively from the background noise than the block DFT filters detection algorithm and the block LMS detection algorithm.

Figure 4
figure 4

The spectral peak of the block DFT filters detection.

Figure 5
figure 5

The spectral peak of the block LMS detection.

Figure 6
figure 6

The spectral peak of the BFFTAA-MAE detection.

Then the performance of the detection algorithm is described in Figure 7 with the Receiver Operating Characteristics (ROC). The block DFT filters detection and the block LMS detection should have the proximate performance. There is bit error in Figure 7 between the block DFT filters detection and the block LMS detection mainly because of the simulation error. From Figure 7, the BFFTAA-MAE detection still has higher detection probability and lower false alarm probability at -5.8 dB SNR if the detection probability 80% is taken as the performance standard. For uniting the advantage of the BFFTAA algorithm and matrix accumulation estimation, the BFFTAA-MAE algorithm has better performance than the block DFT filters and the block LMS detection. Obviously, the BFFTAA-MAE algorithm can degrade the strong noise to raise the weak signal step by step, and implement the weak signal detection from strong background noise. In comparison, the algorithm can better adapt to the complex radio environment and work in low SNR detection environment, and has advantageous over the performance of other two detection algorithms.

Figure 7
figure 7

The ROC of the detection algorithm with SNR = -5.8 dB.

4. Conclusion

Since the cognitive radio can be used widely in communication, the spectrum cognitive algorithm will be given more and more importance. For the requirement of the cognitive radio, the new detection algorithm of the primary user's signal is introduced for the signal detection from the background noise in the paper. Its core is to acquire the frequency-domain estimate value Ŝ through matrix accumulative calculation of the data processed by the Block-FFT adaptive filter algorithm. The result of the detection will be obtained by decision to the frequency-domain estimate value.

By simulation, it is obvious that the BFFTAA-MAE detection algorithm can solve the problem of the signal detection in low SNR, in other words, the algorithm greatly improves the detection performance. The detection algorithm can detect the primary user's signal, and collect spectrum-hole for cognitive users to communication. Because of adapting the block-FFT adaptive filter algorithm and matrix accumulative algorithm, the BFFTAA-MAE detection algorithm can suppress not only the white noise but also colored noise. So the detection algorithm has definite prospect in the cognitive radio field.


  1. Sahai A: Some fundamental limits on cognitive radio. Proceedings of Allerton Conference, Monticello 2004.

    Google Scholar 

  2. Čabrić Danijela, Mishra Shridhar, Willkomm Daniel, Brodersen Robert, Wolisz Adam: Corvus: a cognitive radio approach for usage of virtual unlicensed spectrum. Berkeley Wireless Research Center White Paper 2004.

    Google Scholar 

  3. Lansford J: Universal radio: making new spectrum. Fourth Annual International Symposium On Advanced Radio Technologies, Boulder, CO 2002.

    Google Scholar 

  4. Cabric D, Mishra SM, Brodersen RW: Implementation issues in spectrum sensing for cognitive radio. 38th Annual Asilomar Conference on Signals, System and Computers 2004.

    Google Scholar 

  5. Soliman S: Cognitive radio: key performance indicators. QUALCOMM Incorporated 2004.

    Google Scholar 

  6. Ghozz M, Dohler M, Marx F, Palicot J: Cognitive radio: methods for the detection of free bands. Comptes Rendus Physique 2006,7(7):794-804. 10.1016/j.crhy.2006.07.009

    Article  Google Scholar 

  7. Jaiswal K: Spectral sensing for cognitive radio: estimation of adaptive frequency hopping signal. IEEE Region 10 Conference (TENCON 2008), Hyderabad, India 2008, 2614-2618.

    Google Scholar 

  8. Tandra R, Sahai A: SNR walls for signal detection. IEEE J Select Top Signal Process 2008,2(1):4-17.

    Article  Google Scholar 

  9. Clark GA, Mitra SK, Parker SR: Block implementation of digital filters. IEEE Trans Circuits Syst 1981,28(6):584-592. 10.1109/TCS.1981.1085018

    Article  MATH  Google Scholar 

  10. Ferrara ER: Fast implementation of LMS adaptive filters. IEEE Trans ASSP 1980,28(4):474-475. 10.1109/TASSP.1980.1163432

    Article  Google Scholar 

  11. Farhang-Boroujeny B: Adaptives Filters: Theory & Applications (Wiley, UK). 1998.

    Google Scholar 

  12. Hu C-C, Jhu W-C: Adaptive block DFT-LMS signal detection in ultra-wideband communications. Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA 2009, 543-544.

    Google Scholar 

  13. Atrouz B, Alimohad A, A"ıssa B: An effective jammers cancellation by mean of a rectangular array antenna and a sequential block LMS algorithm: case of mobile sources. Prog Electromagn Res C 2009, 7: 193-207.

    Article  Google Scholar 

  14. Zhou H-J, Sun B-H, Li J-F, Liu Q-Z: Efficient optimization and realization of a shaped-beam planar array for very large array application. Prog Electromagn Res 2009, 89: 1-10.

    Article  Google Scholar 

  15. Nikias CL: Signal processing with high-order spectra. IEEE Signal Process Mag 1993,10(3):10-37. 10.1109/79.221324

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding authors

Correspondence to Hongjun Wang or Guangguo Bi.

Additional information

5. Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Wang, H., Bi, G., Zhong, Z. et al. Adaptive primary user's signal detection algorithm based on matrix accumulation estimation for cognitive radio. EURASIP J. Adv. Signal Process. 2011, 51 (2011).

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: